Fresh Listing

Posted: February 19, 2026 (1 day ago)

This job was posted recently. Fresh listings typically have less competition.

Information Technology Specialist (InfoSec)

Administrative Office of the U.S. Courts

Judicial Branch

Fresh

Location

Location not specified

Salary

$74,678 - $177,554

per year

Closes

February 25, 2026

Job Description

Summary

This job involves managing and securing digital identities, access controls, and authentication systems for the U.S.

federal court system to ensure only authorized people can access sensitive resources.

The role focuses on building and maintaining secure setups like single sign-on and multi-factor authentication, while shifting to a 'zero trust' approach that constantly checks users and devices.

It's a great fit for experienced IT security professionals who enjoy solving complex technical problems in a government environment.

Key Requirements

  • At least one year of specialized experience administering enterprise-level identity providers
  • Experience configuring and troubleshooting federated protocols like SAML, OIDC, and OAuth for single sign-on
  • Proven skills in designing zero trust frameworks and implementing conditional access policies based on device health and user behavior
  • Expertise in managing enterprise directory services such as Active Directory or LDAP, including digital identity lifecycle management
  • Ability to engineer and maintain secure identity, credential, and access management (ICAM) systems in hybrid on-premises and cloud environments
  • Familiarity with NIST SP 800-63 standards and federal ICAM mandates (desired)
  • Industry certifications like CISSP, CIAM, or Microsoft SC-300 (desired)

Full Job Description

This position is in the Department of the Chief Information Officer (DCIO), Infrastructure & Platform Services Office (IPSO), Platform Engineering Division (PED), Identity and Access Branch (IAB).

IAB ensures the right people have access to the right resources at the right time by managing digital identities, single sign-on, and multi-factor authentication.

Applicants must have demonstrated experience as listed below.

This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.

Applicants must have at least one full year (52 weeks) of specialized experience, which is in or directly related to the line of work of this position.

Specialized experience is demonstrated experience in ALL of the following: Administering enterprise-level identity providers.

Configuring and troubleshooting federated protocols (SAML, OIDC, OAuth) for single sign-on across diverse environments.

Designing zero trust frameworks and implementing conditional access policies based on device health and user behavior.

Managing enterprise directory services (Active Directory/LDAP), including lifecycle management of digital identities and privileged groups Desired, but Not Required: Familiarity with the Federal Judiciary and Administrative Office (AO) policies.

Possession of industry-recognized professional certification such as Certified Information Systems Security Professional (CISSP), Certified Identity and Access Manager (CIAM), or specialized cloud identity certification (e.g., Microsoft SC-300).

Experience with cloud-native identity services (IDaaS) in multi-cloud environments (AWS, Azure, and GCP). Major Duties:

The Platform Engineering Division (PED) is seeking an Information Technology Specialist (InfoSec) to join its Identity and Access Branch (IAB).

The Information Technology Specialist (InfoSec) serves as a technical authority for the engineering, implementation, and tier 3 support of the organization's identity, credential, and access management (ICAM) ecosystem and zero trust architecture (ZTA).

The Information Technology Specialist (InfoSec) manages digital identities, single sign-on (SSO), and multi-factor authentication (MFA) and plays a key role in the organization's transition to a zero trust model by developing dynamic access control policies that continuously verify identity and device health across hybrid on-premises and cloud environments.

Duties include, but are not limited to: Engineering and maintaining enterprise directory services in accordance with NIST SP 800-63 standards to ensure secure ICAM operations.

Governing the identity lifecycle through automated onboarding and offboarding workflows and enforcing least privilege principles.

Designing and deploying SSO and MFA solutions aligned with authenticator assurance levels to reduce unauthorized access.

Integrating federal and commercial applications using SAML 2.0, OIDC, and OAuth 2.0 to ensure secure federation and token exchange.

Leading Zero Trust policy engineering by managing policy decision points and policy enforcement points in a "never trust, always verify" framework.

Configuring conditional access policies to evaluate real-time signals, including device posture, user risk, and geolocation.

Managing public key infrastructure, including certificate issuance and revocation, to maintain enterprise trust.

Implementing hardware-based authenticators to meet federal phishing-resistant authentication requirements.

Performing Tier 3 troubleshooting for directory replication, hybrid synchronization, and federation metadata issues.

Assessing identity and access risks and developing contingency plans for outages or credential compromise.

Mentoring technical staff on federal ICAM mandates and developing job aids to enhance service delivery and security posture.

Check your resume before applying to catch common mistakes

Browse Similar Jobs

Posted on USAJOBS: 2/19/2026 | Added to FreshGovJobs: 2/19/2026

Source: USAJOBS | ID: 26-CIO-12886406