U.S. flag

An official website of the United States Government

One department.
Many opportunities.

There are many opportunities for DHS Cybersecurity Service employees to contribute their skills and talents to secure our Nation's information technology infrastructure.

DHS Cybersecurity Service employees work across our cybersecurity missions and Components in jobs that span 17 different cybersecurity specializations – which we call technical capabilities. In the DHS Cybersecurity Service, you can chart a career path based on your interests, while honing critical skills. Whether you are looking for your first cybersecurity job or have spent years in the field, DHS has opportunities for you.

Where We Work
Our cybersecurity mission is accomplished through work across the Department. DHS Components with current DHS Cybersecurity Service positions include:
DHS Cybersecurity Service Technical Capabilities

The work we do spans multiple cybersecurity technical capabilities. Our jobs are structured around these capabilities. Most employees join with a primary technical capability, reflecting the majority of their cybersecurity technical expertise and experience. If you are just beginning your cybersecurity career, we will work with you to identify and develop a primary technical capability.

Our work also requires core professional and, as applicable, leadership capabilities. Visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Architecture
Cybersecurity Architecture:

Develop and advise on system and security designs and processes.

In this role, you may use your expertise in:

  • Systems Requirements Analysis
  • Secure Network Design
  • Secure Software Design
  • Secure Systems Development
  • Systems Testing and Evaluation
  • Regulatory Advisory

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Defensive Operations – Intelligence Collection and Analysis
Cybersecurity Defensive Operations – Intelligence Collection and Analysis:

Protect the Nation from cyber threats and threat actors using your analytic and investigative skills.

In this role, you may use your expertise in:

  • Intelligence Collection
  • Intelligence Analysis

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities

Cybersecurity Defensive Operations – Planning, Execution, and Analysis
Cybersecurity Defensive Operations – Planning, Execution, and Analysis:

Create and implement the strategies that protect the Nation from cyber attacks.

In this role, you may use your expertise in:

  • Operations Planning and Execution
  • Operations Analysis

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Engineering
Cybersecurity Engineering:

Build and lead technology solutions.

In this role, you may use your expertise in:

  • Cybersecurity Hardware Engineering
  • Cybersecurity Systems Engineering
  • Secure Software/Application Design
  • Cybersecurity Capability/Solutions Evaluation
  • Cybersecurity Testing and Evaluation

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Policy
Cybersecurity Policy:

Direct and define the Department's cybersecurity policies.

In this role, you may use your expertise in:

  • Strategic Planning
  • Policy Advisement
  • Cybersecurity Policy Development and Writing
  • Cybersecurity Governance
  • Cybersecurity Legislative Affairs

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Program Management
Cybersecurity Program Management:

Design, execute, and manage the Department's cybersecurity programs.

In this role, you may use your expertise in:

  • Cybersecurity Program Design
  • Cybersecurity Program Execution
  • Cybersecurity Investment Management

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Research and Development
Cybersecurity Research and Development:

Serve a critical role through all phases of the R&D lifecycle.

In this role, you may use your expertise in:

  • Cybersecurity Research Planning
  • Cybersecurity Research Development and Delivery
  • Cybersecurity Research Testing and Evaluation

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Risk Management and Compliance
Cybersecurity Risk Management and Compliance:

Oversee and support the Department's risk assessment, management, and strategy.

In this role, you may use your expertise in:

  • Organizational Risk Strategy
  • Organizational Risk Assessment
  • Organizational Risk Management
  • Policy Interpretation

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Cybersecurity Threat Analysis
Cybersecurity Threat Analysis:

Identify, analyze, and report on cybersecurity threats and threat actors.

In this role, you may use your expertise in:

  • Intelligence Analysis
  • Warning Analysis
  • Threat Assessment

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Data Science
Data Science:

Apply your data collection, analysis, and management skills to strengthen the Nation's cybersecurity.

In this role, you may use your expertise in:

  • Data Collection and Ingestion
  • Data Management
  • Statistical Modeling
  • Data Visualization

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Digital Forensics
Digital Forensics:

Protect, preserve, and support our Nation's digital information.

In this role, you may use your expertise in:

  • Forensic Analysis
  • Cyber Investigation
  • Reverse Engineering
  • Malware Analysis

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Mitigation and Response
Mitigation and Response:

Investigate, analyze, and respond to threats to the Nation's networks, systems, and applications.

In this role, you may use your expertise in:

  • Incident Response and Recovery
  • Network Monitoring and Defense
  • Malware Analysis

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Physical, Embedded, and Control Systems Security
Physical, Embedded, and Control Systems Security:

Protect our Nation's industrial control, physical, and embedded systems.

In this role, you may use your expertise in:

  • Embedded Compute Systems
  • ICS/SCADA
  • Internet of Things
  • Building/Facilities Automation

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Secure Network Operations
Secure Network Operations:

Ensure the usability of the Department's networks and systems.

In this role, you may use your expertise in:

  • Network Engineering
  • Operating Systems
  • Distributed Systems
  • Network Management

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Secure Software Engineering
Secure Software Engineering:

Build, maintain, and oversee critical secure custom software and infrastructure.

In this role, you may use your expertise in:

  • System Design
  • System Testing and Evaluation
  • Developer and Security Operations
  • Code Authoring and Review

Visit Resources for more information about DHS Cybersecurity Service capabilities.

Security System Operations and Maintenance
Security System Operations and Maintenance:

Play a critical role in maintaining the integrity of the Department's systems and devices.

In this role, you may use your expertise in:

  • Security Systems Administration
  • Systems Implementation Knowledge
  • Information Systems Security Monitoring
  • Continuity of Security Operations

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.

Vulnerability Assessment
Vulnerability Assessment:

Protect the Nation's information technology infrastructure from threats and vulnerabilities.

In this role, you may use your expertise in:

  • Vulnerability Risk Assessment
  • Penetration Testing

Watch video below or visit Resources for more information about DHS Cybersecurity Service capabilities.