No Degree? No Problem. The Changing Landscape for Government Job Seekers

There are nearly 200,000 job openings across the federal government. Within those openings, a large percentage are in the areas of Cybersecurity and Artificial Intelligence (AI). Building the workforce in these relatively new disciplines is forcing a new look at traditional requirements for careers in government.

The practice of skills-based hiring is gaining traction in government as a way to fill these important vacancies with a more diverse set of talent. Skill-based hiring involves looking beyond degrees and certifications and identifying candidates' skills that are applicable to the role. For example, a person may not have a computer science degree, but they have worked extensively with a key programming language or system in previous roles.

Uncovering Skills Not Experience

A candidate could have great experience. A four-year degree from a prestigious school. Past work with brand-name companies. But if you really dig in, you may find they don't actually possess the skills needed to get the job done. Continue reading

The Lesser Known Missions of Homeland Security

The mission of the Department of Homeland Security (DHS) is widely understood, "to safeguard the American people, our homeland, and our values." However, in carrying out this mission, DHS touches a number of areas that may not seem intuitively tied to homeland defense but are nonetheless critical challenges facing the nation as well as agencies across government.

Artificial Intelligence

DHS has a key role in securing the homeland from cyber threats. The department's Cybersecurity & Infrastructure Security Agency (CISA) is the operational lead for federal cybersecurity and the national coordinator for critical infrastructure security and resilience. With this responsibility, CISA and other DHS agencies play a key role in shaping policy and guidance around emerging technology use. Today, they are keenly focused on helping agencies safely and ethically use Artificial Intelligence (AI) to improve mission effectiveness.

DHS is leading by example. AI is currently being used to aid border-patrol efforts, combat drug trafficking, and create age-progression estimations of missing children. While implementing AI itself, DHS is also focused on how adversaries may use AI and creating ways to defend against the technology being used to spread disinformation, create more advanced cyber attacks, or speed the development of weapons. Continue reading

Charting a Course to Ensure Security in the Stars


Cybersecurity plans need to encompass physical and virtual assets located on earth as well as those orbiting the earth. The cyber universe extends into the actual universe with satellites, weapons systems, and exploratory vehicles and devices all connecting to terrestrial networks. Protecting those endpoints and the IT paths in between is critical. A
Russian attack on the Viasat satellite constellation knocked out communications across Ukraine on the eve of an invasion and serves as a high-stakes example of how much we rely on space-based objects for basic communication.

The U.S. Space Force and NASA are working to harden and protect the IT between earth and space, but are facing the same issues as other agencies in terms of the cybersecurity skills gap. There simply are not enough trained people to complete all the work that needs to be done to secure the vast network these organizations oversee. To bridge this gap, space agencies are finding new ways to meet the cyber needs of the nation, and the universe. Continue reading

Staying Ahead of the Bad Guys: Investing in Cybersecurity

Agencies are challenged to move more and more services online, become more transparent, and leverage new streams of data from the Internet of Things (IoT) for better decision making, all while securing the systems and the data they hold. If that is not challenging enough, cyber threats against all of these efforts are continually evolving. A series of strategies and ongoing guidance are helping agencies prioritize work and budget requests to make the most impactful investments in their cybersecurity infrastructure.

The National Cybersecurity Strategy (NCS) provides broad guidance to help position the United States to build a digital ecosystem that is more easily and inherently defensible, resilient, and aligned with its values. Efforts to do so are organized around five pillars:

1) Defend Critical Infrastructure

2) Disrupt and Dismantle Threat Actors

3) Shape Market Forces to Drive Security and Resilience

4) Invest in a Resilient Future

5) Forge International Partnerships to Pursue Shared Goals Continue reading

Understanding the Technology Modernization Fund

The Technology Modernization Fund (TMF) was created by the Modernizing Government Technology Act of 2017 to more quickly fund needed modernization projects across government. With TMF, agencies can apply for funding to complete modernization activities without having to wait for the budget cycle to begin work on critical digital initiatives. Funding is incremental to ensure projects are working as expected.

Agencies must repay the investment either using the cost savings achieved with the tech implementation or through future budget allocations. The model is working. Of the 11 initial projects to receive TMF funding, two agencies have already reimbursed the fund, and five others have completed their projects and are in the process of reimbursement.

Continue reading