Check out our Know your rights page! Click here

National Institute of Health

National Institutes of Health
The National Institutes of Health (NIH) seeks Contract Specialists in support of its mission to detect, prevent, treat and cure the diseases that affect mankind. The NIH is the world’s largest biomedical research organization and is a part of the US Federal Government, Department of Health and Human Services. These positions are located in the Bethesda/Rockville Maryland area. Contact: Jane Spencer, NIH Corporate Recruitment, Office of Human Resources. Jane.Spencer@nih.gov

Contract Specialist

  • Perform specialized contract award and administration work
  • Research, interpret, and apply the rules, regulations, policies, and procedures governing NIH acquisitions to plan, manage, and participate in various aspects of contracting
  • Evaluate bid responsiveness, contractor responsibility and performance
  • Apply knowledge of contract types, methods, and techniques
  • Apply knowledge of contract administration and termination techniques sufficient to administer and close out contracts
  • Coordinate and conduct negotiations on assigned programs
  • Apply critical thinking and judgment skills to various work assignments to identify and troubleshoot potential problems and to develop remedies and solutions


The National Institutes of Health (NIH) seeks IT Specialists (Information Security) in support of its mission to detect, prevent, treat and cure the diseases that affect mankind. The NIH is the world’s largest biomedical research organization and is a part of the US Federal Government, Department of Health and Human Services. These positions are located in the Bethesda/Rockville Maryland area. Contact: Jane Spencer, NIH Corporate Recruitment, Office of Human Resources. Jane.Spencer@nih.gov

IT Specialist (Information Security)
  • Serve as a principal contact for coordination, implementation, and enforcement of information security policies.
  • Lead and coordinate the implementation of security programs across platforms and establish vulnerability reporting criteria.
  • Enforce proper backup procedures for all system and network information and enforce legal controls that provide protection from unauthorized access, alteration, loss, disclosure, and blocking of information.
  • Review and evaluate security incident response policies.
  • Identify the need for changes based on new security technologies or threats.