{"id":555,"date":"2022-02-23T21:03:41","date_gmt":"2022-02-23T21:03:41","guid":{"rendered":"http:\/\/he-cyberdegrees-org-sonic.lndo.site\/?p=555"},"modified":"2022-12-08T13:23:25","modified_gmt":"2022-12-08T13:23:25","slug":"government-cyber-security-careers","status":"publish","type":"post","link":"https:\/\/www.cyberdegrees.org\/resources\/government-cyber-security-careers\/","title":{"rendered":"Government Cybersecurity Careers"},"content":{"rendered":"<p>Are you interested in pursuing a technology-focused career with the government? Do you see yourself working with the latest computer technologies to protect sensitive information against cyberattacks? A government cybersecurity job may be an excellent fit.<\/p>\r\n<p>Professionals in government cybersecurity positions enjoy competitive pay, job security, and growth opportunities. Cybersecurity positions like information security analysts earn a <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">median annual wage of $103,590<\/a>. The Bureau of Labor Statistics (BLS) projects <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">33% growth in information security analyst positions<\/a> between 2020-2030.<\/p>\r\n<p>This guide explores how to obtain cybersecurity <a class=\"wpil_keyword_link \" href=\"http:\/\/www.cyberdegrees.org\/jobs\/\" title=\"jobs\" data-wpil-keyword-link=\"linked\">jobs<\/a> in government. We also cover popular cybersecurity positions at the federal, state, and local levels.<\/p>\r\n\r\n<h2>Cybersecurity and the Government Landscape<\/h2>\r\n<p>The Morris Worm of 1988, widely considered to be the first denial of service computer attack, led to the first computer emergency response team (CERT). Created by Carnegie Mellon University, CERT developed strategic defensive responses to malicious attacks that still influence cyber defense today.<\/p>\r\n<p><a href=\"https:\/\/sopa.tulane.edu\/blog\/four-reasons-cybersecurity-field-rapidly-growing\" target=\"_blank\" rel=\"noopener noreferrer\">Significantly increasing cyberthreats<\/a> and high-profile data breaches place cybersecurity professionals in high demand. As hackers and cybercriminals develop new attack methods, government and private-sector cybersecurity professionals must adapt to the latest technologies for safeguarding information.<\/p>\r\n<p>The need for training professionals against cyberthreats continues to grow. The <a href=\"https:\/\/www.cisa.gov\/news\/2021\/10\/20\/cisa-awards-2-million-bring-cybersecurity-training-rural-communities-and-diverse\" target=\"_blank\" rel=\"noopener noreferrer\">Cybersecurity and Infrastructure Agency<\/a> (CISA) actively recruits cybersecurity professionals, ramping up both recruiting and training among rural communities and diverse populations throughout 2021.&nbsp;<\/p>\r\n<p>The <a href=\"https:\/\/www.dhs.gov\/news\/2021\/11\/15\/dhs-launches-innovative-hiring-program-recruit-and-retain-world-class-cyber-talent\" target=\"_blank\" rel=\"noopener noreferrer\">Department of Homeland Security<\/a> also launched a new hiring program for government cybersecurity jobs in government in November 2021.<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/diversity-in-cybersecurity\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Is cybersecurity a diverse field?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"branches-that-use-cybersecurity\" id=\"branches-that-use-cybersecurity\"><\/a>\n\n\r\n\r\n<h2>Government Branches That Depend on Cybersecurity<\/h2>\r\n<p>As online technologies and cyberthreats become more sophisticated, the government needs cybersecurity professionals to safeguard documents and computer networks. While each role is different, entry-level government cybersecurity jobs require at least a bachelor's degree and related work experience.<\/p>\r\n<p>Some government agencies prefer to <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/In-house-vs-outsourced-cybersecurity-operations-center-capabilities\" target=\"_blank\" rel=\"noopener noreferrer\">outsource cybersecurity operations<\/a> to the private sector. In other words, job-seekers may encounter positions with government entities that are actually operated by an outside organization rather than in-house.<\/p>\r\n<p>Below are some of the federal agencies and departments that employ professionals in government cybersecurity jobs. This is not an exhaustive list.<\/p>\r\n\r\n\r\n<h3><sonic-icon icon=\"plus-sm\" color=\"#1271E4\"><\/sonic-icon>Federal Agencies<\/h3>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.epa.gov\/careers\" target=\"_blank\" rel=\"noopener noreferrer\">Environmental Protection Agency<\/a>:<\/strong> The EPA creates and enforces environmental laws. It also writes regulations for national standards for environmental protection that states must follow. The EPA employs cybersecurity professionals to safeguard their computer networks. These professionals also develop guides for states to follow regarding particular infrastructures, like the water sector.<\/li>\r\n<li><strong><a href=\"https:\/\/www.nsa.gov\/careers\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Security Agency<\/a>:<\/strong> The NSA serves as an intelligence agency focused on communications security within the Department of Defense. It employs approximately 40,000 workers, many of whom specialize in digital communications and cybersecurity. NSA is the leading employer of cybersecurity workers in the U.S. These professionals monitor threats and implement defense strategies using tools like subversive software. Most workers reside in Baltimore, Maryland, or Washington, D.C.<\/li>\r\n<li><strong><a href=\"https:\/\/apply.fbijobs.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Bureau of Investigation<\/a>:<\/strong> FBI cybersecurity jobs continue to grow both at FBI headquarters in Washington, D.C. and in its 56 nationwide offices with dedicated cybersecurity squads. These workers assist with federal crime investigations, safeguard FBI computer systems against threats, and assist other agencies with special projects.<\/li>\r\n<\/ul>\r\n<h3><sonic-icon icon=\"plus-sm\" color=\"#1271E4\"><\/sonic-icon>The Military<\/h3>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.army.mil\/join\/\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Army<\/a>:<\/strong> The Army labels cyberspace as a critical area of national defense. It operates a dedicated cybersecurity team, Army Cyber Command, which employs workers like cyberwarfare technicians, cyberoperations specialists, and electronic warfare technicians. Depending on the role, the Army considers candidates with applicable expert-level knowledge in offensive and defensive operations, management of personnel and online assets, and electronic warfare operations planning.<\/li>\r\n<li><strong><a href=\"https:\/\/www.airforce.com\/careers\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Air Force<\/a>:<\/strong> With advancements in Air Force computer technology come new vulnerabilities and security issues. This branch of the military employs \"Cyber Surety\" specialists to secure its computer networks and related operations. Minimum qualifications for Air Force cybersecurity jobs include a high school diploma or GED certificate, basic training, and knowledge of information systems.<\/li>\r\n<li><strong><a href=\"https:\/\/www.navy.com\/careers\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Navy<\/a>:<\/strong> The Navy employs professionals in dozens of government cyber jobs. Its intelligence, information, and cryptology team offers positions for cryptologic technicians in maintenance, networks, and collection. There's also a high-priority search for cryptologic technician interpreters.&nbsp;<\/li>\r\n<\/ul>\r\n<h3><sonic-icon icon=\"plus-sm\" color=\"#1271E4\"><\/sonic-icon>Research, Education, and General Support<\/h3>\r\n<ul>\r\n<li><strong><a href=\"https:\/\/www.cisa.gov\/nice-cybersecurity-workforce-framework\" target=\"_blank\" rel=\"noopener noreferrer\">National Initiative for Cybersecurity Education<\/a>:<\/strong> NICE, which is part of the National Institute of Standards and Technology (NIST) in the U.S. Department of Commerce, strives to advance cybersecurity education, workforce development, and training. Professionals at NICE possess specialized knowledge in cybersecurity, strategic management, policy writing, and research.<\/li>\r\n<li><strong><a href=\"https:\/\/www.gao.gov\/about\/careers\" target=\"_blank\" rel=\"noopener noreferrer\">U.S. Government Accountability Office<\/a>:<\/strong> The GAO serves as a congressional watchdog and an investigative body tied to Congress. It strives to hold members of Congress accountable for their actions and improve their performance to ultimately benefit the American people. GAO employs <a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-auditor\/\">cybersecurity professionals trained in defense tactics and security auditors<\/a> who test its network for weaknesses against cyberterrorists and hacker groups.<\/li>\r\n<li><strong><a href=\"https:\/\/careers.pnnl.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pacific Northwest National Library<\/a>:<\/strong> Government-funded research libraries such as PNNL employ cybersecurity professionals to safeguard classified information. PNNL seeks out cybersecurity engineers and researchers who possess certifications in Network+, CCNA, or Security+ and extensive experience with cyber defense strategies.<\/li>\r\n<\/ul>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"types-of-jobs\" id=\"types-of-jobs\"><\/a>\n\n\r\n\r\n<h2>Types of Cybersecurity Jobs in the Government Sector<\/h2>\r\n<p>Cybersecurity jobs in government include many titles depending on the specific roles. Multiple branches of government require cybersecurity support. Take a quick look at the types of cybersecurity jobs in government and their responsibilities.<\/p>\r\n\r\n\r\n    <table class=\"sonic-table\">\r\n        <thead>\r\n            <tr>\r\n                <th><strong>Position<\/strong><\/th>\r\n                <th><strong>Job Duties<\/strong><\/th>\r\n                <th><strong>Branches<\/strong><\/th>\r\n            <\/tr>\t\r\n        <\/thead>\t\r\n        <tbody>\r\n            <tr>\r\n                <td data-title=\"Position\"><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-architect\/\">Security Architect<\/a><\/strong><\/td>\r\n                <td data-title=\"Job Duties\">\r\n                    <ul>\r\n                    <li>Ensures security standards support and protect branch's missions and business processes<\/li>\r\n                    <li>Address issues in branch's cybersecurity architecture, information security, and systems security<\/li>\r\n                    <li>Determine safety and protection needs for systems and networks<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n                <td data-title=\"Branches\">\r\n                    <ul>\r\n                        <li>Cybersecurity and Infrastructure Security Agency (CISA)<\/li>\r\n                        <li>Department of Homeland Security (DHS)<\/li>\r\n                        <li>Department of Information Technology and Telecommunications, State-level<\/li>\r\n                        <li>State-level Department of Defense<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n            <\/tr>\r\n            <tr>\r\n                <td data-title=\"Position\"><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-manager\/\">Information Security Manager<\/a><\/strong><\/td>\r\n                <td data-title=\"Job Duties\">\r\n                    <ul>\r\n                        <li>Lead teams of system security officers to maintain information assurance support for entire branch<\/li>\r\n                        <li>Conduct risk assessments and identify solutions for architectural issues<\/li>\r\n                        <li>Communicate and collaborate with cybersecurity professionals in other branches to stay abreast of emerging technologies and programs<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n                <td data-title=\"Branches\">\r\n                    <ul>\r\n                        <li>Sandia National Laboratories<\/li>\r\n                        <li>Defense Intelligence Agency (DIA)<\/li>\r\n                        <li>Cybersecurity and Infrastructure Security Agency (CISA)<\/li>\r\n                        <li>Department of Transportation (DOT)<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n            <\/tr>\r\n            <tr>\r\n                <td data-title=\"Position\"><strong><a href=\"https:\/\/www.cyberdegrees.org\/jobs\/security-analyst\/\">Program\/Security Analyst<\/a><\/strong><\/td>\r\n                <td data-title=\"Job Duties\">\r\n                    <ul>\r\n                        <li>Compiles research on security threats to benefit other cybersecurity professionals within branch<\/li>\r\n                        <li>Assists with defense program planning, cost estimates, and policy recommendations<\/li>\r\n                        <li>Prepares briefings for senior branch management<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n                <td data-title=\"Branches\">\r\n                    <ul>\r\n                        <li>Department of Homeland Security (DHS)<\/li>\r\n                        <li>Department of State (DOS)&nbsp;<\/li>\r\n                        <li>Department of Agriculture (USDA)<\/li>\r\n                    <\/ul>\r\n                <\/td>\r\n            <\/tr>\r\n        <\/tbody>\r\n    <\/table>\r\n<figcaption>Source: <a href=\"https:\/\/www.usajobs.gov\" target=\"_blank\" rel=\"noopener noreferrer\">USAJOBS<\/a>, <a href=\"https:\/\/www.dia.mil\/\" target=\"_blank\" rel=\"noopener noreferrer\">DIA<\/a><\/figcaption>\r\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/jobs\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Explore more jobs in cybersecurity<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/careers-for-vets\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Discover cybersecurity careers for veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n<section>\n\t<div class=\"text-center mb-8\">\n\t\t<sonic-tooltip class=\"block text-xs text-center mb-4\" label=\"Learn More About Our Partners\">\n\t\t\t<span>CyberDegrees.org is an advertising-supported site. Featured or trusted partner programs and all school search, finder, or match results are for schools that compensate us. This compensation does not influence our school rankings, resource guides, or other editorially-independent information published on this site.<\/span>\n\t\t<\/sonic-tooltip>\n\t<\/div>\n\t<div class=\"bootcamp-widget rounded bg-white box-border pb-10\">\n\t\t<img decoding=\"async\" loading=\"lazy\" class=\"m-auto -mt-8\" src=\"https:\/\/res.cloudinary.com\/highereducation\/image\/upload\/w_120,h_82,c_fill,f_auto,fl_lossy,q_auto\/v1622734180\/BestColleges.com\/sonic\/icon-click.svg\" width=\"120\" height=\"82\" alt=\"\"\/>\n\t\t<h3 class=\"text-center text-2xl md:text-3xl font-bold mt-8 md:mt-12 mb-2 md:mb-3 px-4\">Match me with a bootcamp.<\/h3>\n\t\t<p class=\"text-center text-base mb-8 px-3\">Find programs with your skills, schedule, and goals in mind.<\/p>\n\t\t<div class=\"text-center w-full\">\n\t\t\t<a href=\"\/discover\" rel=\"nofollow noopener noreferrer\" target=\"_blank\" class=\"sonic-btn bg-primary-800 hover:bg-primary-900 focus:bg-primary-900 uppercase mx-auto w-64 font-heading\" data-tracking=\"&#x7B;&quot;log&quot;&#x3A;true,&quot;event&quot;&#x3A;&quot;click&quot;,&quot;beam&quot;&#x3A;&quot;ElementClicked&quot;,&quot;data&quot;&#x3A;&#x7B;&quot;position&quot;&#x3A;&quot;PRIMARY&quot;,&quot;location&quot;&#x3A;&quot;BOOTCAMP&#x20;MATCH&#x20;WIDGET&quot;,&quot;elementType&quot;&#x3A;&quot;LINK&quot;,&quot;text&quot;&#x3A;&quot;MATCH&#x20;ME&#x20;TO&#x20;A&#x20;BOOTCAMP&quot;&#x7D;,&quot;actionOutcome&quot;&#x3A;&quot;INTERNALLINK&quot;&#x7D;\">Match me to a bootcamp<\/a>\n\t\t<\/div>\n\t<\/div>\n<\/section>\n\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"career-outlook\" id=\"career-outlook\"><\/a>\n\n\r\n\r\n<h2>Career Outlook for Government Cybersecurity Jobs<\/h2>\r\n<p>The job outlook and median salaries for cybersecurity jobs in the government look bright. The BLS projects well above average job growth for information security analyst, computer and information systems manager, and computer and information research scientist. For example, openings for information security analysts may <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">increase by 33% between 2020-2030<\/a>.&nbsp;<\/p>\r\n<p>The <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">federal government employs 31%<\/a> of all computer and information research scientists in the U.S. In addition to a strong job outlook of <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">22% growth<\/a> between 2020-2030, BLS reports that these professionals earn a <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">median annual wage of $126,830<\/a>.<\/p>\r\n<p>The availability and type of cybersecurity positions vary among government branches. Some government cybersecurity jobs require a specific set of cybersecurity skills or specialties.<\/p>\r\n\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\r\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\"><\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p><p class=\"heading-3\" style=\"padding-bottom: 10px;\">Information Security Analysts<\/p><p><strong>Annual Median Pay:<\/strong> $103,590<br><small>Source: <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/information-security-analysts.htm\" target=\"_blank\" rel=\"noopener noreferrer\">BLS<\/a><\/small><\/p><\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\n\r\n\r\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\"><\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p><p class=\"heading-3\" style=\"padding-bottom: 10px;\">Computer and Information Systems Managers<\/p><p><strong>Annual Median Pay:<\/strong> $151,150<br><small>Source: <a href=\"https:\/\/www.bls.gov\/ooh\/management\/computer-and-information-systems-managers.htm\" target=\"_blank\" rel=\"noopener noreferrer\">BLS<\/a><\/small><\/p><\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\n\r\n\r\n<div class=\"statbox bg-secondary-50 text-secondary-800 h-full\">\n    <div class=\"statbox__content h-full mx-auto text-center px-4 sm:px-6 shadow-lg\">\n                <h3 class=\"statbox__title font-extrabold leading-9 sm:leading-10\"><\/h3>\n                    <div class=\"statbox__text mt-4 leading-6\">\n                <p><p class=\"heading-3\" style=\"padding-bottom: 10px;\">Computer and Information Research Scientists<\/p><p><strong>Annual Median Pay:<\/strong> $126,830<br><small>Source: <a href=\"https:\/\/www.bls.gov\/ooh\/computer-and-information-technology\/computer-and-information-research-scientists.htm\" target=\"_blank\" rel=\"noopener noreferrer\">BLS<\/a><\/small><\/p><\/p>\n            <\/div>\n                    <\/div>\n<\/div>\n\n\n\r\n\r\n\n<\/div>\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"career-pros-and-cons\" id=\"career-pros-and-cons\"><\/a>\n\n\r\n\r\n<h2>Pros and Cons of Government Cybersecurity Jobs<\/h2>\r\n<p>Cybersecurity jobs offer new and experienced workers competitive wages and credentials that can boost their careers. However, there are differences between government cybersecurity roles and jobs with contractors and private industries. In the pros and cons lists below, we highlight certain job duties, perks, and expectations for the public sector when compared to the private sector.<\/p>\r\n\r\n\r\n<h4>Advantages of Government Cybersecurity Jobs<\/h4>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1271E4\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" type=\"solid\" data-color=\"#1271E4\">\r\n        <strong>Longevity:<\/strong> Professionals who obtain in-house positions with federal agencies may experience a longer tenure in a particular role than those working for outsourced security operations centers. Workers in the private sector may experience more ups and downs, including furloughs and layoffs, depending on their company's finances.\r\n    <\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1271E4\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" type=\"solid\" data-color=\"#1271E4\">\r\n        <strong>Benefits:<\/strong> In-house government cybersecurity jobs likely come with a pension that provides workers with a monthly income after they retire. Pensions may draw some professionals in, as pensions are not part of freelance or contract work. Moreover, government employees can count on paid federal holidays and health benefits.\r\n    <\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#1271E4\" size=\"medium\" icon=\"check-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"check-circle\" type=\"solid\" data-color=\"#1271E4\">\r\n        <strong>College Tuition Reimbursement:<\/strong> Government cybersecurity employees often enjoy perks like college tuition reimbursement and student loan assistance.\r\n    <\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n<h4>Drawbacks of Government Cybersecurity Jobs<\/h4>\r\n\r\n  <section class=\"checklist-v2\">\n    \n        <ul class=\"space-y-6\">\n    \n    \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"x-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"x-circle\" type=\"solid\" data-color=\"#12C7C4\">\r\n        <strong>Schedule:<\/strong> Some cybersecurity jobs in government come with an unpredictable schedule and require professionals to work on nights and weekends. While challenging work schedules may exist in the private sector, cybersecurity jobs with the FBI and DHS often require weekend, evening, and holiday work.\r\n    <\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"x-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"x-circle\" type=\"solid\" data-color=\"#12C7C4\">\r\n        <strong>Pay:<\/strong> According to <a href=\"https:\/\/www.captechu.edu\/blog\/choosing-career-path-in-cybersecurity\" target=\"_blank\" rel=\"noopener noreferrer\">Capitol Technology University<\/a>, government cybersecurity jobs pay less than contracted positions and private companies. In some cases, contracted and privately employed cybersecurity workers can make up to 50% more than government workers.\r\n    <\/section><\/div>\n  <\/li>\n          \n                                  \n                <li class=\"flex text-gray-900 list-none\">\n          <sonic-icon class=\"mr-2\" color=\"#12C7C4\" size=\"medium\" icon=\"x-circle\"><\/sonic-icon>\n        <div class=\"non-title text-gray-700 self-end text-base\"><section class=\"checklist-item\" data-icon=\"x-circle\" type=\"solid\" data-color=\"#12C7C4\">\r\n        <strong>Stress:<\/strong> Along with unpredictable schedules, government cybersecurity jobs often require employees to work in fast-paced environments with lots of responsibility. Small human errors in cybersecurity can lead to serious, long-standing security issues, causing workers and organizations great stress.\r\n    <\/section><\/div>\n  <\/li>\n          \n        <\/ul>\n      <\/section>\n\n\n\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-secondary-700 \">\n    <a\n        target=\"_self\"\n        href=\"\/resources\/women-in-cybersecurity\/\"\n        class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Learn how cybersecurity is becoming more inclusive<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"getting-a-government-job\" id=\"getting-a-government-job\"><\/a>\n\n\r\n\r\n<h2>How to Get a Cybersecurity Job in Government<\/h2>\r\n<p>Entry-level cybersecurity jobs in the government tend to require a bachelor's degree in computer science or a related field, and some work experience. Prospective cybersecurity workers can become more competitive candidates with <a href=\"\/resources\/certifications\/\">cybersecurity certifications<\/a> and training programs such as <a href=\"\/listings\/cyber-security-bootcamps\/\">cybersecurity bootcamps<\/a>.&nbsp;<\/p>\r\n<p>Undergraduate programs with regional accreditation offer credentials that advance students toward a career in government cybersecurity. Public and private schools, independent providers, and eligible training providers (ETPs) offer <a href=\"https:\/\/www.cyberdegrees.org\/listings\/best-cyber-security-bootcamps\/\">cybersecurity bootcamps<\/a>. When choosing a program, learners should closely examine the curricula and recent graduates' career outcomes.<\/p>\r\n<p>Regardless of government branch, cybersecurity job applicants can expect to undergo background checks and rigorous interview processes. Aspiring cybersecurity government professionals should take advantage of job preparation services at their school or through a private company to best prepare for the application process.&nbsp;<\/p>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/security-clearances\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Do you need a security clearance to work for the government?<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n\r\n<h2>Resources for Getting a Government Cybersecurity Job<\/h2>\r\n\r\n<h3>Professional Organizations<\/h3>\r\n\r\n<sonic-resource-list title=\"Anti-Phishing Working Group\" titleLink=\"https:\/\/apwg.org\/\" target=\"true\">\r\n  <p>Established in 2003, APWG strives to unify cybersecurity professionals across the globe who work in government, law enforcement, and nonprofits. Entities including government agencies, university-based researchers, solution providers, law enforcement, and qualified financial institutions may apply for membership. Members gain access to its eCrime Exchange services and conferences to network and build collective knowledge about defenses against cyber threats.<\/p>\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"Center for Internet Security\" titleLink=\"https:\/\/www.cisecurity.org\/\" target=\"true\">\r\n  <p>This nonprofit provides ongoing development of widely used cybersecurity practices known as CIS Controls and CIS Benchmarks. Members include individuals, government entities, and businesses who benefit from CIS's online resources, networking opportunities, and compliance reviews of information security strategies.<\/p>\r\n<\/sonic-resource-list>\r\n<sonic-resource-list title=\"SANS Technology Institute\" titleLink=\"https:\/\/www.sans.edu\/\" target=\"true\">\r\n  <p>The SANS Institute, short for SysAdmin, Audit, Network, and Security, provided training and certification for cybersecurity professionals. Specialty training offerings at SANS include cyber defense and blue team operations, digital forensics and incident response, and cloud security. Members enjoy access to open-source tools, whitepapers, cyber ranges, and informational webcasts.<\/p>\r\n<\/sonic-resource-list>\r\n\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"resources\" id=\"resources\"><\/a>\n\n\r\n<section class=\"-mx-4 md:-mx-1\/2vw py-12 md:py-16 mt-12 md:my-16 relative md:left-1\/2 md:right-1\/2 md:w-screen bg-gray-50\">\n    <div class=\"container content\">\n        \r\n<h3>Education Options<\/h3>\r\n<div class=\"grid md:grid-cols-2 lg:grid-cols-3 gap-5 my-8\"> \n  \r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062580\/CyberDegrees.org\/GettyImages-1187635203\/GettyImages-1187635203.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Associate in Cybersecurity Programs<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/associate-degrees\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062570\/CyberDegrees.org\/GettyImages1-1159379067\/GettyImages1-1159379067.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Bachelor's in Cybersecurity Programs<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/bachelors-degrees\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062538\/CyberDegrees.org\/GettyImages-903626078\/GettyImages-903626078.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Master's in Cybersecurity Programs<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/masters-degrees\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062548\/CyberDegrees.org\/GettyImages-619503664\/GettyImages-619503664.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Doctorate in Cybersecurity Programs<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/doctoral-degrees\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062546\/CyberDegrees.org\/GettyImages-1200908449\/GettyImages-1200908449.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Cybersecurity Bootcamps<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/cyber-security-bootcamps\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n\n  \n<div class=\"card card-base flex flex-col w-full rounded-lg shadow-lg bg-white overflow-hidden relative \">\n  <div class=\"flex-shrink-0 relative\">\n        <img decoding=\"async\"\n      class=\"w-full object-cover h-40\"\n      src=\"https:\/\/res.cloudinary.com\/highereducation\/images\/f_auto,q_auto\/c_fill,f_auto,fl_lossy,q_auto:best\/v1620062550\/CyberDegrees.org\/GettyImages-1213479360\/GettyImages-1213479360.jpg?_i=AA\"\n      loading=\"lazy\"\n      alt=\"1\"\n    \/>\n          <\/div>\n  <div class=\"flex flex-col p-8 \">\n    <h3 class=\"text-xl font-bold text-gray-900 text-center tracking-tight\">Cybersecurity Certificates<\/h3>\n        <div class=\"text-gray-500 text-sm\">\r\n<\/div>\n            <a class=\"sonic-btn button button--no-theme js-card-button\" href=\"https:\/\/www.cyberdegrees.org\/listings\/certificate-programs\/\" target=\"_self\">Learn More<\/a>\n      <\/div>\n<\/div>\n\n\n\n\n\r\n\n<\/div>\n\r\n\n    <\/div>\n<\/section>\n\r\n\r\n<h3>Scholarship Opportunities<\/h3>\r\n\r\n<ul style=\"list-style-type: none;\">\r\n<li><sonic-icon icon=\"chevron-right\" color=\"#1271E4\"><\/sonic-icon><strong><a href=\"https:\/\/niccs.cisa.gov\/formal-education\/cybercorps-scholarship-service-sfs\" target=\"_blank\" rel=\"noopener noreferrer\">CyberCorps Scholarship for Service<\/a>:<\/strong> This program strives to provide financial support for individuals preparing for cybersecurity careers with federal, state, local, tribal, or territorial governments. Working professionals and college students at all levels may apply.&nbsp;<\/li>\r\n<p>Award recipients can receive up to three years of support, including yearly stipends of $25,000 for undergraduates and $34,000 for graduate students. The award also covers the cost of the student's tuition and related fees. Recipients must complete post-graduation government service requirements.<\/p>\r\n<p>Working professionals receive a $6,000 allowance to attend job fairs and conferences or pursue professional certifications in cybersecurity.&nbsp;<\/p>\r\n<li><sonic-icon icon=\"chevron-right\" color=\"#1271E4\"><\/sonic-icon><strong><a href=\"https:\/\/federaljobs.net\/blog\/the-stokes-educational-scholarship-program-nsa\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stokes Educational Scholarship Program<\/a>:<\/strong> High school seniors who plan on pursuing a bachelor's degree in computer science or electrical engineering may apply for this $30,000\/year scholarship. Recipients also work for the National Security Association during the summer months. The award comes with guaranteed employment with the NSA upon graduation.<\/li>\r\n<li><sonic-icon icon=\"chevron-right\" color=\"#1271E4\"><\/sonic-icon><strong><a href=\"https:\/\/nps.edu\/web\/c3o\/scholarships\" target=\"_blank\" rel=\"noopener noreferrer\">Naval Postgraduate School (NPS) Center for Cybersecurity and Cyber Operations<\/a>:<\/strong> The C3O scholarship supports students who plan on pursuing FBI cybersecurity jobs or positions with the NSA or CIA. NPS covers recipients' tuition for two years. The award comes with a $34,000\/year stipend and $6,000 for career development expenses.<\/li>\r\n<\/ul>\r\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/scholarships-military-veterans\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Find more scholarships for military and veterans<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\n<div class=\"sonic-interlink duration-500 flex hover:shadow-lg bg-primary-700 \">\n    <a target=\"_self\" href=\"https:\/\/www.cyberdegrees.org\/resources\/gi-bill\/\" class=\"flex items-center p-8 relative rounded w-full transition-opacity duration-500 hover:opacity-75\">\n                <span class=\"text-white block w-full\">\n          <span class=\"interlink-content flex justify-between items-center\">\n            <div>\n                                                <span class=\"title leading-snug\">Use the GI Bill to pay for a cybersecurity degree<\/span>\n                            <\/div>\n            <sonic-icon class=\"ml-3 md:ml-0\" icon=\"arrow-circle-right\" size=\"small\" color=\"#fff\"><\/sonic-icon>\n          <\/span>\n        <\/span>\n    <\/a>\n<\/div>\n\n\n\r\n\r\n<br>\r\n\n  \n  \n  <a class=\"subnav-waypoint\" name=\"faq\" id=\"faq\"><\/a>\n\n\r\n\r\n<h2>FAQ's About Government Cybersecurity Jobs<\/h2>\r\n\r\n<h3>Can you work for the government in cybersecurity?<\/h3>\r\n<p>Yes. The government relies on cybersecurity professionals to safeguard classified and unclassified information, protect its networks, and provide defensive strategies against malicious online threats and cyberterrorists. Government cybersecurity employees have skills in cyber incident response, risk assessment, digital forensics, and software assurance. <\/p>\r\n\r\n<h3>What are some examples of government cyber jobs?<\/h3>\r\n<p>Yes. Popular roles for cybersecurity professionals in government include computer and information research scientist, information security analyst, and security architect. Many branches of government also seek out threat investigators, threat analysts, and IT security administrators.<\/p>\r\n\r\n<h3>Are there cybersecurity jobs in the FBI?<\/h3>\r\n<p>Yes. The FBI employs various cybersecurity professionals as part of its cybercrime division. Competitive applicants for these positions possess at least a bachelor's degree in computer science or related area, and experience in networking, programming, or cryptography.<\/p>\r\n\r\n<h3>Are entry-level cybersecurity jobs hard to get?<\/h3>\r\n<p>Job applicants with a bachelor's degree in computer science or related field compete for positions in this growing and in-demand field. According to the <a href=\"https:\/\/www.nist.gov\/press-coverage\/nearly-600000-open-cybersecurity-related-jobs-were-listed-over-12-months\" target=\"_blank\" rel=\"noopener noreferrer\">National Institute of Standards and Technology<\/a>, government bodies, businesses, and organizations listed a staggering nearly 600,000 open cybersecurity jobs throughout 2021.<\/p>","protected":false},"excerpt":{"rendered":"Curious about cybersecurity jobs in the government, and how to get one? Learn about cybersecurity jobs with the FBI, Homeland Security, and more.","protected":false},"author":5,"featured_media":2106,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_cloudinary_featured_overwrite":false,"footnotes":""},"categories":[1],"states":[],"resources-overview":[],"degrees":[],"jobs-overview":[30],"rankings":[],"class_list":["post-555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","jobs-overview-general"],"acf":[],"menu_order":0,"_links":{"self":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/comments?post=555"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/posts\/555\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media\/2106"}],"wp:attachment":[{"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/media?parent=555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/categories?post=555"},{"taxonomy":"states","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/states?post=555"},{"taxonomy":"resources-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/resources-overview?post=555"},{"taxonomy":"degrees","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/degrees?post=555"},{"taxonomy":"jobs-overview","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/jobs-overview?post=555"},{"taxonomy":"rankings","embeddable":true,"href":"https:\/\/www.cyberdegrees.org\/wp-json\/wp\/v2\/rankings?post=555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}