Fresh Listing

Posted: March 18, 2026 (0 days ago)

This job was posted recently. Fresh listings typically have less competition.

IT Cybersecurity Specialist (INFOSEC)

Defense Contract Management Agency

Department of Defense

Fresh

Location

Salary

$94,514 - $144,540

per year

Closes

March 30, 2026More DOD jobs →

GS-11 Pay Grade

Base salary range: $62,107 - $80,737

Typical requirements: 1 year specialized experience at GS-10. Ph.D. or equivalent doctoral degree, or 3 years graduate study.

Note: Actual salary includes locality pay (15-40%+ depending on location).

Job Description

Summary

This job involves testing and assessing cybersecurity vulnerabilities in government networks, applications, and cloud systems to protect defense contracts from cyber threats.

You'll conduct penetration tests, analyze weaknesses like hacking entry points in web apps, and research new attack methods to help secure the agency's IT infrastructure.

It's a great fit for someone with hands-on experience in ethical hacking and a passion for staying ahead of cyber risks in a structured government environment.

Key Requirements

  • One year of specialized experience in penetration testing methodologies, tools, and techniques across networks, web apps, cloud, and mobile domains
  • Strong knowledge of web application security vulnerabilities, including OWASP Top 10 such as SQL injection, XSS, and broken authentication
  • Proficiency with penetration testing tools like Kali Linux, Metasploit, Burp Suite, Cobalt Strike, and Acunetix
  • In-depth understanding of operating systems (Windows, Linux), network protocols (TCP/IP), and security architectures
  • Experience with scripting languages like Python, PowerShell, or Bash for automation and custom tool development
  • IT competencies in attention to detail, customer service, oral communication, and problem solving

Full Job Description

See below for important information regarding this job. Additional vacancies may be filled from this announcement.

To qualify for an IT Cybersecurity Specialist (INFOSEC), your resume and supporting documentation must support: Specialized Experience: One year of specialized experience that equipped you with the competencies to successfully perform the duties of the position and is directly in, or related to, this position.

To qualify for the NH-03 level, specialized experience must be at the NH-02 or GS-11 grade level or equivalent under other pay systems in the Federal service, military or private sector.

Applicants must meet eligibility requirements including time-after-competitive appointment, minimum qualifications, and any other regulatory requirements by the cut-off/closing date of the announcement.

Creditable specialized experience includes: Expert knowledge of penetration testing methodologies, tools, and techniques across various domains (e.g., network, web application, cloud, mobile).

Strong understanding of web application security vulnerabilities and common attack vectors (e.g., OWASP Top 10).

Proficiency with various penetration platforms and testing tools such as Kali, Cobalt Strike, Sliver, Metasploit, Burp Suite, Acunetix, etc.

In-depth knowledge of operating systems (Windows, Linux), network protocols (TCP/IP), and common security architectures.

Experience with scripting languages (e.g., Python, PowerShell, Bash) for automating tasks and developing custom tools.

For all positions individuals must have IT-related experience demonstrating each of the four competencies listed below. 1.

Attention to Detail - Is thorough when performing work and conscientious about attending to detail. 2.

Customer Service - Works with clients and customers (that is, any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.

3.

Oral Communication - Expresses information (for example, ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (for example, technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.

4. Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations. Major Duties:

  • Support the Director of Cybersecurity and Chief Information Security Officer (CISO) within the Defense Contract Management Agency (DCMA), Information Technology Directorate (IT).
  • Serve as the Offensive Cyber Operations (OCO) Analyst.
  • Functions as the DoD Cyber workforce Vulnerability Assessment Analyst (VAA).
  • Conduct full-scope penetration tests against a variety of targets, including network infrastructure, operating systems, applications, and cloud environments within the DCMA network boundary to identify exploitable vulnerabilities.
  • Identify and analyze common web application vulnerabilities from the Open Worldwide Application Security Project (OWASP) such as SQL injection, Cross-Site Scripting (XSS), Broken Authentication, and insecure deserialization.
  • Conduct and/or oversee internal and external penetration tests and vulnerability assessments, ensuring comprehensive coverage across DCMA's systems and applications.
  • Conduct research into new attack techniques, vulnerabilities, and exploitation methods.

Check your resume before applying to catch common mistakes

Browse Similar Jobs

Posted on USAJOBS: 3/18/2026 | Added to FreshGovJobs: 3/19/2026

Source: USAJOBS | ID: DCMA-P2-26-12909142-MP