recommended reading

Justice Is Fast-Tracking Cyber Hires

Wikimedia

The Justice Department is recruiting cyber professionals under special rules to fill vacancies more quickly now that funding constraints have eased somewhat, the department's top network security official said. While the severity of hacks is increasing, civilian agencies still struggle to bring capable computer programmers on staff.

Justice is moving beyond "the sequestration, the budget concerns from the last couple of years," Justice Chief Information Security Officer Melinda Rogers told Nextgov. She was referring to governmentwide spending cuts that took effect March 2013. "Our hiring freeze has lifted, and we're moving forward." 

To lure cyber sleuths, Justice promotes career opportunities to computer whizzes who have collaborated with the department, she said.

"We are also proactively networking within the community, as we come across individuals that we work with on a day-to-day basis that we find to be talented, Rogers said.

She added that the department has been granted the ability to fast-track offers through a "direct hire authority." But all positions are listed publicly on the official government website, USAJOBS.gov. "It's an open and fair competition process,” Rogers said.

She had just finished speaking at a cyber human capital conference hosted by the Association for Federal Information Resources Management and the U.S. Cyber Challenge, an organization working to build the nation’s cybersecurity workforce. 

An FBI supervisory special agent recently said, at a separate event, that his agency’s cyber division plans to hire 1,000 agents and 1,000 analysts in the coming year, according to Bloomberg.  

Within Rogers' wing, there are "a handful" of openings, “but we're actually filling up quickly," she said. 

Departmentwide, four cyber-related positions are posted on the official federal website USAJOBS.gov. Justice needs a Counterintelligence, Export Control and Economic Espionage Chief, which is a senior executive position, and the FBI is looking for three salaried General Schedule computer scientists. 

Expedited hiring only goes so far, though. At other civilian agencies, it has not boosted staffing as quickly as officials anticipated. 

In 2010, then-Homeland Security Department Secretary Janet Napolitano said her department had been granted direct hire authority to add 1,000 new cyber professionals over three years so the department could compete with the Pentagon's accelerated hiring process. Estimates by DHS, the Defense Department and the Government Accountability Office tallied fewer than 1,500 DHS cyber professionals compared with 66,000 to 88,000 personnel Defensewide.

Today, Homeland Security still suffers from a shortage of key cyber analysts, according to the DHS inspector general

Threatwatch Alert

Network intrusion / Spear-phishing

Researchers: Bank-Targeting Malware Sales Rise in Dark Web Markets

See threatwatch report

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.