SUPV IT CYBERSECURITY SPECIALIST (INFOSEC)
Defense Information Systems Agency
Posted: March 17, 2026 (0 days ago)
This job was posted recently. Fresh listings typically have less competition.
Space Systems Command
Department of the Air Force
Location
Salary
$99,800 - $154,280
per year
Type
Full-Time
More IT & Technology jobs →Closes
Entry salary: $74,441 | Full performance (GS-13): up to $115,079
Career ladder: Start at GS-12 and advance to GS-13 with experience.
Typical requirements: 1 year specialized experience at GS-11. Advanced degree + significant experience.
Note: Actual salary includes locality pay (15-40%+ depending on location).
This job involves reviewing and securing modifications to critical space systems like GPS and satellite networks to protect them from cyber threats, managing authorization processes, and coordinating tests to find and fix vulnerabilities.
A good fit would be someone with experience in IT security, especially in defense or government settings, who enjoys analyzing systems and working on team-based cyber defense projects.
Do not email applications. To submit your resume for this Direct Hire opportunity click here.
For additional information on other USSF direct hire opportunities visit the Air Force Civilian Careers Space Force website and follow USSF on LinkedIn.
The 2210 series has an individual occupational requirement that must be met and can be viewed here. There is no Group Coverage Qualification Standard for this series. Major Duties:
The United States Space Force (USSF) at Peterson Space Force Base, Colorado Springs, CO is searching for a Cybersecurity Analyst to support 31STS (NH-2210-03, GS-12/13 Equivalent).
Description: The 31st Sustainment Squadron's Cyber Branch is responsible for reviewing proposed modifications to the Global Positioning System (GPS) and the Satellite Control Network (SCN) to ensure that hardware/software solutions are sound from a cybersecurity perspective.
The branch manages cyber authorization packages for GPS and SCN systems including artifact verification, eMASS entry, and compliance plans.
This includes coordinating Security Control Assessments and meeting Risk Management Framework requirements.
The Cyber Branch analyzes test results from a variety of cyber assessments and proposes system modifications to mitigate vulnerabilities.
The branch also coordinates internal and external penetration test activities and develops continuous monitoring and incident response capabilities used by cyber defenders Ideal Candidate: The ideal candidate will possess a background in mission system sustainment (cyber analysis of system modifications, contract verbiage), mission system authorizations (Risk Management Framework, Security Control Assessments, ISSM/ISSO), defensive Cyber operations (cyber tools, cyber incident response, exercise planning), vulnerability management (patch, scan, STIG, cyber orders processing) and penetration testing (analysis of vulnerabilities, red/blue team activities, scenario planning).
Possess an Undergraduate or Graduate Education degree in computer science, engineering, information science, information systems management, mathematics, operations research, statistics, or technology management or degree that provided a minimum of 24 semester hours in one or more of the fields identified above and required the development or adaptation of applications, systems, or networks.
Key Skills and Abilities: 1.
IT professional who demonstrates that they can manage a cybersecurity program at the enterprise level using the DoD's cybersecurity / RMF management system, currently eMASS, Xacta, and ITIPS.
Can maintain cybersecurity documentation including: creating policies, SSPs, network topologies, POA&Ms. 2.
Knowledge of the missions, roles, functions, organizational structures, and operation of the Department of Defense, and entities that govern, interface with, and/or influence management control of proposed and ongoing service contracts.
3.
Knowledge of the principles, methods, and techniques of IT assessment, planning, management, monitoring, and evaluation as well as knowledge of the principles, methods, or tools for developing, scheduling, coordinating, managing IT projects and resources, monitoring and inspecting costs, work, and contractor performance.
Ability to lead and manage information systems planning, development, implementation, operation, and maintenance. 4.
Knowledge of the principles, methods, and tools for the coordinated management of IT programs to include providing oversight of multiple IT projects, integrating dependent schedules and deliverables, and related activities such as life cycle management and program governance.
5.
Knowledge of the principles and methods to identify, analyze, specify, design, and manage functional and infrastructure requirements; includes translating functional requirements into technical requirements used for logical design or alternative technologies or approaches.
Ability to research and analyze external products to determine their potential for meeting mission requirements and business needs. 6.
Knowledge of concepts, practices, and techniques used to identify, engage, influence and monitor relationships with individuals and groups connected to IT work/development efforts.
Includes those who are actively involved, those who exert influence over the process and its results, and those who have a vested interest in the outcome.
Ability to work effectively with customers to assess their requirements then provide information, expertise, and assistance to satisfy those needs. 7.
Ability to communicate effectively, both orally and in writing, clearly, concisely, with technical accuracy and to use computers and a variety of software programs and databases, gather and analyze a variety of program information, make sound judgments concerning program progress, and effectively communicate recommendations orally and in writing to higher organizational management and contractors.
Check your resume before applying to catch common mistakes