Find your next job in your inbox.
Subscribe for AFCS’ automatic job announcement email notifications, and your next job just might find you.
It’s the perfect place to get your career off the ground. All you have to do is nail the landing.
The Office of Special Investigation (OSI) is a federal law enforcement and counterintelligence agency serving our nation’s Air Force and Space Force. Armed with elite investigative training and state-of-the-art technology, OSI’s special agents pursue justice as they conduct criminal and counterintelligence investigations, as well as investigate cybercrime and procurement fraud. Agents also specialize in investigative services such as forensics, polygraph, technical operations, and digital forensics.
CAREER PATHS
Fully accredited Criminal Investigator
PAQ QUALIFICATIONS
U.S. citizenship
Recent graduate (within two years of completing degree or within six years if a Veteran) or full-time undergraduate/graduate student graduating during current semester
Bachelor’s or master’s degree in science, finance, intelligence, and cyber backgrounds to support the OSI criminal and counterintelligence mission sets or related fields.
GPA 2.95 or above
Ability to obtain Security Clearance funded by Department of Air Force
Pass rigorous background investigation
Pass all medical and physical requirements
PAQ PROGRAM DETAILS
A formal three-year training and career development track
Training at the Federal Law Enforcement Training Center (FLETC)
Real-world projects and missions
Mentoring provided by Senior leadership
Annual performance-based promotions
Placement into a permanent Air Force Civilian Service position once PAQ Program is successfully completed
PAQ BENEFITS
Student Loan Repayment
Tuition Assistance toward a graduate degree while in the PAQ program
Paid move to employment location (if required upon conversion to PAQ program)
Fueled by innovation, ingenuity, and a start-up mentality, Unified Platform/LevelUP Code Works is the principal cyber factory for the Air Force, developing rapidly deployable software capabilities in support of the Department of the Air Force and the Department of Defense’s most critical cyber missions. It’s responsible for developing, implementing, and maintaining the Development/Security/Operations (DevSecOps) software development toolkit across the Department of Defense and the armed services.
Black Label supports Offensive Cyber Warfare and Information Warfare for the Department of the Air Force and the Department of Defense by providing advanced DevSecOps capabilities and technologies that streamline software development and deploy it in non-traditional, innovative ways to meet warfighters’ every need the instant they need it.
Platform One is the official Development, Security, and Operations (DevSecOps) enterprise of the Department of Defense (DoD), congregating the top capabilities of the Software Factories at the core of its software ecosystem to create Cloud Native Computer Foundation (CNCF)-compliant Kubernetes distributions, infrastructure as code playbooks, hardened containers, and other Customer DevSecOps Platforms with baked-in security.
EITaaS partners with industry leaders to incorporate best-in-class commercial technology to standardize Department of the Air Force (DAF) IT services, improving the agility, reliability, and resiliency of IT data operations, while maximizing user productivity and optimizing mission readiness enterprise-wide.
Business and Enterprise System Product Innovation (BESPIN) develops cutting-edge digital solutions for Airmen and Guardians that delivers exceptional custom mobile experiences reliably anywhere, anytime, improving safety, quality of life, and mission success.
Kessel Run’s primary mission is to create scalable digital architecture to optimize all-domain command and control capabilities that define the next-generation air dominance systems, accelerate dynamic targeting, and establish a more resilient operating presence through Agile Combat Employment.
Cloud One provides valuable tools to significantly reduce software development costs while deploying powerful Risk Management Framework processes that allow applications to inherit a common infrastructure and entry-point for negotiating the cloud.