Fresh Listing

Posted: March 13, 2026 (2 days ago)

This job was posted recently. Fresh listings typically have less competition.

IT Specialist (INFOSEC), GS-2210-14, FPL GS-14 (Direct Hire)

Federal Student Aid

Department of Education

Fresh

Location

Salary

$143,913 - $187,093

per year

Closes

March 27, 2026

Job Description

Summary

This job involves leading cybersecurity efforts in a federal agency that manages student aid, focusing on protecting systems from cyber threats through testing, incident response, and vulnerability management.

It suits experienced IT professionals who enjoy coordinating security teams, analyzing risks, and improving defenses in a high-stakes environment.

A good fit would be someone with strong technical skills in threat detection and clear communication abilities to explain complex issues to non-experts.

Key Requirements

  • One year of specialized experience equivalent to GS-13, including at least two of: coordinating penetration testing and team exercises, managing a Security Operations Center (SOC) for incident response, or overseeing vulnerability management and cyber hygiene scans
  • IT-related experience demonstrating competencies in attention to detail, customer service, oral communication, and problem solving
  • Knowledge of Cyber Kill Chain, MITRE ATT&CK framework, and common attack methodologies
  • Expertise in SIEM, EDR, Web Application Firewall (WAF), forensics methodology, and threat intelligence integration
  • Ability to hunt for threats in complex data, translate technical findings into business risks, and facilitate collaboration between security teams
  • Familiarity with NIST SP 800-61r2 for incident response, updating playbooks, SOPs, and improving SOC workflows

Full Job Description

This position is in the U.S. Department of Education (ED), Federal Student Aid (FSA), Technology Directorate (TD).

The Technology Directorate provides information technology services for all FSA systems, promoting the effective and secure use of technology to achieve FSA's strategic objectives through sound planning, investments, integrated technology architectures and standards, effective systems development, production support, and cybersecurity services.

Specialized Experience for the GS-14: One year of experience in either federal or non-federal service that is equivalent to at least a GS-13 performing two (2) out of three (3) of the following duties or work assignments: Experience coordinating Pen Testing, Red Team, and Purple Team exercises, testing defenses against simulated attacks, applying threat intelligence, and updating playbooks to continuously develop the SOC analytics capabilities.

Experience in managing a SOC, leading advanced cyber incident triage and response efforts, including detection, investigation, containment, eradication, and recovery, for complex security events such as APTs and data exfiltration attempts, while documenting findings, ensuring alignment with Incident Response (IR) plans and NIST SP 800-61r2, improving SOC workflows, Standard Operating Procedures (SOP)s, and playbooks.

Experience in conducting continuous, risk-based vulnerability management, overseeing cyber-hygiene and CDM scans to enforce enterprise-wide baseline security posture.

Basic Experience Requirements: You must possess IT related experience (paid or unpaid experience and/or completion of specific, intensive training (e.g., IT certification), as appropriate) demonstrating each of the four competencies listed below.

Attention to Detail - Is thorough when performing work and conscientious about attending to detail.

Customer Service - Works with clients and customers (i.e., any individuals who use or receive the services or products that your work unit produces, including the general public, individuals who work in the agency, other agencies, or organizations outside the Government) to assess their needs, provide information or assistance, resolve their problems, or satisfy their expectations; knows about available products and services; is committed to providing quality products and services.

Oral Communication - Expresses information (e.g., ideas or facts) to individuals or groups effectively, taking into account the audience and nature of the information (e.g., technical, sensitive, controversial); makes clear and convincing oral presentations; listens to others, attends to nonverbal cues, and responds appropriately.

Problem Solving - Identifies problems; determines accuracy and relevance of information; uses sound judgment to generate and evaluate alternatives, and to make recommendations.

Knowledge, Skills, and Abilities (KSAs): The quality of your experience will be measured by the extent to which you possess the following knowledge, skills and abilities (KSAs).

You do not need to provide separate narrative responses to these KSAs, as they will be measured by your responses to the occupational questionnaire (you may preview the occupational questionnaire by clicking the link at the end of the Evaluations section of this vacancy announcement).

Knowledge of the Cyber Kill Chain, MITRE ATT&CK framework, and common attack methodologies. Expertise in SIEM, EDR, Web Application Firewall (WAF), forensics methodology, and threat intelligence.

Knowledge of attacker frameworks (MITRE ATT&CK), the skill to hunt through complex data for hidden threats, and the ability to translate technical findings into business risk, and the ability to facilitate collaboration between Red and Blue teams.

Skill in SIEM systems, EDR, including their configuration and optimization, expertise in forensics, pen testing, integrating threat intelligence feeds and managing cyber hygiene initiatives.

Ability to communicate complex technical risks clearly to executive and non-technical audiences, think strategically about security operations to align them with business objectives, and apply strong root cause analysis to drive effective decision-making and continuous improvement.

Major Duties:

APPLICATION LIMIT: This vacancy announcement is limited to the first 200 applications received and will close at 11:59PM Eastern Time on the day that we receive the 200th application, or at 11:59PM Eastern Time on the listed closing date, whichever occurs first.

We encourage you to read this entire vacancy announcement prior to submitting your application. We encourage you to read this entire vacancy announcement prior to submitting your application.

As an Information Technology Specialist (INFOSEC), GS-2210-14, you will be responsible for: Serving as the Security Operations Center (SOC) incident response coordinator using tools like Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR)s, and ServiceNOW ticket system, leading the full LiveCycle of incident response, from detection through recovery, while coordinating containment and eradication efforts working with several partners, and continuously improving workflows and playbooks.

Serving as the senior technical lead by coordinating Pen Testing, Red Team, and Purple Team exercises, the manager tests defenses against simulated attacks.

This creates a feedback loop that continually strengthens detection capabilities and hones the team's technical skills.

Managing security vulnerabilities and detecting threats to uphold cyber hygiene, managing Continuous Diagnostics and Mitigation (CDM) security baselines.

Reporting stakeholder communication and presenting through PowerPoint, MS Project, and other briefing tools to deliver daily SOC updates, incident findings, and enterprise security posture insights to executive leadership and non-technical stakeholders, including tailored presentations to the Chief Information (CISO) as needed.

Check your resume before applying to catch common mistakes

Browse Similar Jobs

Posted on USAJOBS: 3/13/2026 | Added to FreshGovJobs: 3/14/2026

Source: USAJOBS | ID: FSA-2026-0039