Agency Employers

Agency employers ensure participants work on mission-critical cybersecurity initiatives.

As threats to the nation’s digital security grow, our government must attract the next generation of motivated, mission-driven cybersecurity leaders. Through the Cybersecurity Talent Initiative, participants serve two years in the federal government, providing agencies with critical support for their cybersecurity needs. During their two-year agency placement, participants benefit from a series of sessions dedicated to strengthening their leadership skills and exposing them to innovations across government and the private sector.

Participating agencies include:

Central Intelligence Agency

The CIA is the nation's premier agency for providing global intelligence in the ever-changing political, social, economic, technological and military landscapes with a mission to protect America's national security.

  • Cyber Exploitation Officer
    Evaluates and analyzes digital and all source intelligence information to identify and assess key adversaries and while extracting valuable information from digital data and presenting findings to inform operations, drive collection and support customers.
  • Cyber Operations Officer
    Gathers intelligence from adversary's systems and networks using advanced tools, techniques and tradecraft to help lead the future of the agency's intelligence mission.

Department of Defense

The mission of the Department of Defense is to provide the military forces needed to deter war and to protect the security of our country. The department's headquarters is at the Pentagon.

  • Army Cyber Command Fellow (Army)
    Detects threats and defends against those who aim to harm the nation through cyberspace by conducting risk and vulnerability assessments, configuring and installing systems, analyzing network traffic, evaluating and fixing the network as needed.
  • IT Strategic Planner (Marines)
    Supports analytical and technical efforts to define and execute IT program goals and strategies, authors relevant documents and provides continuing program analysis and oversight to monitor and evaluate IT program execution and identify the need to refine strategies.
  • IT Governance Analyst (Marines)
    Continuously assesses Marine Corps IT portfolio operations and resource expenditures to evaluate how policy objectives are being achieved and communicates and justifies the costs and benefits of current processes and proposes revisions to established policies.

Department of Energy

The mission of the Department of Energy is to ensure America's security and prosperity by addressing its energy, environmental and nuclear challenges through transformative science and technology solutions.

  • Cyber Analyst
    Works with data from a wide variety of sources to advance new analytic capabilities to keep Energy at the forefront of cybersecurity.

Department of Health and Human Services

The mission of the Department of Health and Human Services is to enhance and protect the health and well-being of all Americans by providing effective health and human services and fostering advances in medicine, public health, and social services.

  • Cybersecurity Analyst
    Detects, monitors and conducts forensic analysis of cyber threats, then translates that technical threat information into language to convey the risk and how to address it in a manner that is easily understood by healthcare professionals.
  • Cybersecurity Operations Engineer (Food and Drug Administration)
    Provides direct support to the chief information security officer for cybersecurity analysis, operations and monitoring of the FDA IT infrastructure and proactively addresses imminent threats to prevent risk exposure and disruption to FDA’s public health mission.

Department of Veterans Affairs

To fulfill President Lincoln's promise “To care for him who shall have borne the battle, and for his widow, and his orphan” by serving and honoring the men and women who are America’s veterans.

  • Data Analyst
    Examines data from multiple disparate sources to provide security and privacy insight. Designs and implements custom algorithms, workflow processes and layouts for complex, enterprise-scale data sets used for modeling, data mining and research.
  • Network Operations Specialist
    Plans, implements and operates network services/systems in hardware and virtual environments.
  • Systems Security Analyst
    Analyzes and develops the integration, testing, operations and maintenance of systems security.
  • Cyber Defense Analyst
    Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments to mitigate threats.
  • Cyber Defense Infrastructure Support Specialist
    Tests, implements, deploys, maintains and administers the infrastructure hardware and software.
  • Cyber Defense Incident Responder
    Investigates, analyzes and responds to cyber incidents within the network environment or enclave.
  • Vulnerability Assessment Analyst
    Performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense-in-depth architecture against known vulnerabilities.

Department of Homeland Security

The mission of Homeland Security is to ensure a homeland that is safe, secure, and resilient against terrorism and other hazards.

DHS will improve national cybersecurity risk management by increasing security and resilience across government networks and critical infrastructure; decreasing illicit cyber activity; improving responses to cyber incidents; and fostering a more secure and reliable cyber ecosystem through a unified departmental approach, strong leadership, and close partnership with other federal and nonfederal entities.

  • Incident Response Manager
    Provides remote and on-site incident response services including intrusion analysis and mitigation guidance, often while triaging multiple incidents simultaneously.
  • Investigative Analyst
    Supports agency cyber investigations by helping to deploy technical solutions, collaborating and communicating with a team to identify needed strategies, and writing post-operational assessments.
  • Network Analyst
    Investigate network traffic to identify any malicious activity.
  • Digital Forensic Analyst
    Investigates the extent and impact of a compromised host.
  • Program Manager, Network Security Deployment
    Conducts new phase lifecycle research and understands security engineering and best practices of securing complex systems and networks.

Environmental Protection Agency

The mission of the Environmental Protection Agency is to protect human health and the environment.

  • Information Systems Security Specialist
    Advises on the design and implementation of programs, policies and procedures and coordinates and disseminates security incident and risk management information to protect the integrity of a variety of operating system environments.
  • Network Security Specialist
    Participates in monitoring performance and functionality of systems and applying information security policies, principles and practices to correct vulnerabilities and mitigate security risks.

Federal Bureau of Investigation

The mission of the FBI is to protect and defend the United States against terrorist and foreign intelligence threats, to uphold and enforce the criminal laws of the United States, and to provide leadership and criminal justice services to federal, state, municipal, and international agencies and partners.

  • Big Data Technologist
    Designs and builds solutions for special agents and intelligence analysts that bring together data from disparate sources, extract mission-critical intelligence and provide advanced analytics to the FBI’s investigative teams.
  • Cloud Engineer
    Brings a systematic approach to conceive, develop, operate and maintain cloud computing systems and solutions for the FBI’s investigative, intelligence and enterprise applications and data.
  • Database Administrator
    Manages database servers to advise, assist and provide support on all FBI enterprise applications in development and production.
  • Program Analyst
    Manages and builds the best technology solutions to stay ahead of threats and support the FBI’s mission.
  • Site Reliability Engineer
    Drives best practices, patterns and architectures to maximize the availability, reliability and stability of platforms, processing and delivery of systems to discover and solve problems before they threaten mission-critical applications.
  • Software Engineer
    Focuses on all processes of the software development lifecycle, including collecting and analyzing system requirements, evaluating viable options, designing and developing solutions, testing and quality assurance and configuration and change management.
  • Information Security Engineer
    Works on application system designs and architecture plans to embed security into development, testing and deployments across the development lifecycle.

Federal Election Commission

The FEC is the independent regulatory agency charged with administering and enforcing the federal campaign finance law over campaigns for the House of Representatives, Senate, presidency and vice presidency.

  • Cybersecurity Policy Analyst
    Develops FEC security policy and procedures, researches best practices, identifies gaps and develops a target state for IT security oversight processes. The position will also be responsible for analyzing and continuously monitoring cybersecurity policies, programs, compliance artifacts or standards to support government security compliance and management.

National Oceanic and Atmospheric Administration

The mission of the National Oceanic and Atmospheric Administration is to understand and predict changes in climate, weather, oceans and coasts; share that knowledge and information with others; and to conserve and manage coastal and marine ecosystems and resources.

  • Internal Risk Mitigation Program Support
    Applies knowledge of cybersecurity operations, compliance and digital capabilities to assist with the evaluation and analysis of information necessary to identify insider threat indicators across NOAA’s IT infrastructure, data landscape, and workforce.


Naval Intelligence

America’s premier maritime intelligence service dedicated to delivering penetrating understanding of threats to America’s security to national decision makers.

  • Data Scientist
    Works with intelligence analysts, data stewards, project managers and other IT teams to turn data into critical information and knowledge that will be used to make sound intelligence assessments.
  • Risk Management Framework Support Officer
    Assists with the oversight, compliance and execution of the Navy’s risk management and executes processes that enhance efficiency of Navy communications within and outside the department.


Small Business Administration

The mission of the Small Business Administration is to aid, counsel, assist and protect the interests of small business concerns, to preserve free competitive enterprise and to maintain and strengthen the overall economy of our nation.

  • Cybersecurity Analyst
    Assesses and addresses cyber risks and threats to small businesses across America and improves real-time information sharing between the federal government and the small business community.

To ensure a successful program, participating federal agencies will:

  • Provide full-time, two-year position(s), inclusive of salary and benefits, beginning in the summer or fall of 2020
  • Work with the Partnership to identify the competencies and qualifications needed for positions
  • Identify relevant agency representatives to participate in the selection process
  • Work with the Partnership on targeted recruitment
  • Provide meaningful work that exposes the candidate(s) to the agency’s mission
  • Assign dedicated supervisors to provide mentoring and guidance
  • Expose participants to cross-organization and cross-government initiatives
  • Ensure participants obtain the appropriate security clearances

Ready to apply?

Applications are now open and will close on October 18, 2019 at 11:59pm EST. Offers will made by spring 2020. For more information, contact us at info@cybertalentinitiative.org or (202) 775-9111.



Agencies interested in joining the Cybersecurity Talent Initiative should email info@cybertalentinitiative.org.