Information Technology Specialist (Security)

Washington, D.C
May 12, 2022
May 20, 2022
IT, Security Engineer
Full Time

The Information Technology (Security) Specialist will serve as a cyber threat intel analyst and will be responsible for the collection, fusion, and dissemination of cyber threat intelligence in support of the 24/7 Security Operations Center (SOC). The specialist will research and coordinate with various federal agencies, commercial entities, and open-source venues at the classified and unclassified levels to provide indicators and warnings, attribution, and threat templating of potential cyber threats targeting the federal judiciary.

The specialist is responsible for promoting, developing, and updating threat profiles associated with the United States Federal Courts. In addition, the incumbent is responsible for assisting with the development of Primary Intelligence Requirements (PIRs), associated collection plans, and the development of relevant and actionable Threat Intelligence Reports (TIRs).

Duties may include, but are not limited to, the following:
  • Identifying unsatisfied and new intelligence requirements in collaboration with other analysts in the judiciary SOC, AO Program Offices and Court Unit Security Personnel.
  • Researching, developing, drafting, coordinating, monitoring, and tasking collection requirements via one or more of the SOC operational subsystems.
  • Developing technical gap analyses for collection plans.
  • Preparing and briefing cyber intelligence analysis to provide customers with a critical understanding of the cyber threat.
  • Identifying cyber threat trends and proposing new or revised analytical efforts to support new developments. Taking the initiative to recommend innovative solutions to improve judgments of cyber adversary intent, and capability and opportunity analysis, and identifying reliable indicators of future activity.
  • Integrating intelligence and information from defensive operations and other government organizations and generating requirements to mitigate or remediate new and emerging threats to networks.
  • Managing and modernizing the threat intelligence collection and analytic platforms utilized within the judiciary and evaluating new technologies for future integration.
  • Developing of finishing cyber intelligence products that include timely technical assessments and recommendations.
  • Applying expert knowledge about judiciary-specific critical assets to a wide variety of threat scenarios.
  • Identifying and creating intelligence requirements through practices such as threat profiling.
  • Developing and updating priority intelligence requirements.
  • Developing and updating specific intelligence requirements.
  • Developing and updating collection plans.
  • Performing construction of link analysis graphs.
  • Creating Indicators of Compromise (IOCs) in formats such as YARA and STIX/TAXII.
  • Developing and maintaining information-sharing relationships with other agencies and departments in the legislative and executive branches of government to foster collaboration.
  • Coordinating with other government agencies and industry partners to operationalize threat intelligence for defensive cyber activities.

  • Requirements

    Conditions of Employment

  • All information is subject to verification. Applicants are advised that false answers or omissions of information on application materials or inability to meet the following conditions may be grounds for non-selection, withdrawal of an offer of employment, or dismissal after being employed.
  • Selection for this position is contingent upon completion of OF-306, Declaration of Federal Employment during the pre-employment process and proof of U.S. citizenship for competitive status positions or conversion to a competitive status position with the AO. If non-citizens are considered for hire into a temporary or any other position with non-competitive status or when it is confirmed by the AO Human Resources Office there are no qualified U.S. citizens for a competitive status position (unless prohibited by a law or statue), non-citizens must provide proof of authorization to work in the U.S. and proof of entitlement to receive compensation. Additional information on the employment of non-citizens can be found at USAJOBS Help Center | Employment of non-citizens / . For a list of documents that may be used to provide proof of citizenship or authorization to work in the United States, please refer to Form I-9, Employment Eligibility Verification .
  • All new AO employees will be required to complete an FBI fingerprint-based national criminal database and records check and pass a public trust suitability check.
  • New employees to the AO will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights/responsibilities, visit .
  • All new AO employees are required to identify a financial institution for direct deposit of pay before appointment.
  • You will be required to serve a trial period if selected for a first-time appointment to the Federal government, transferring from another Federal agency, or serving as a first-time supervisor. Failure to successfully complete the trial period may result in termination of employment.
  • If appointed to a temporary position, management may have the discretion of converting the position to permanent depending upon funding and staffing allocation.

  • Qualifications

    Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.

    Specialized Experience : Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience must demonstrate ALL areas defined below:
  • Working in support of cyber security operations.
  • Using knowledge of different types of adversaries, from script kiddies to Advanced Persistent Threats (APT) tactics, techniques, and procedures.
  • Applicants with the following certifications/experiences are highly desirable:
    • Certified Information Systems Security Professional (CISSP)
    • Certified Information Security Manager (CISM)
    • EC-Council's Certified Ethical Hacker (CEH)


    This position does not require education to qualify.

    Additional information

    The AO is an Equal Opportunity Employer.