This Act limits federal agencies' ability to set minimum education requirements for cybersecurity positions unless mandated by local law, focusing hiring instead on demonstrated skills.
Nancy Mace
Representative
SC-1
The Cybersecurity Hiring Modernization Act reforms federal hiring by limiting agencies' ability to mandate college degrees for competitive service cybersecurity positions. Agencies can only require specific education if mandated by local law or if the education directly proves necessary job skills. This legislation also requires the Office of Personnel Management to track and report on education standards and hiring outcomes for these critical roles.
This bill, the Cybersecurity Hiring Modernization Act, is pretty straightforward: it tells federal agencies to stop requiring college degrees for cybersecurity jobs unless a local law specifically demands it for that role. Think of it as the government finally recognizing that a four-year degree isn’t the only path to competence in a field that changes every six months.
For anyone looking at a federal job in the GS-2210 IT series—which covers a huge chunk of the government’s digital defense roles—this is a game-changer. Section 2 of the Act generally prohibits agencies from setting a minimum education requirement on their own. If an agency does want to consider your education for a qualification, that diploma or certificate must “directly prove” you have the specific skills needed for the job. This means agencies can’t just use a general degree as a blunt instrument for filtering applicants; they have to connect the dots between your coursework and the actual competencies required for, say, threat analysis or network defense. This is a huge win for the self-taught coder, the bootcamp grad, or the veteran with years of on-the-job experience who previously hit a wall because they lacked that specific piece of paper.
This new rule applies to all “covered positions,” which essentially means any job designated as a cybersecurity role under the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework. If you’re currently working in the private sector and have the certifications and experience but skipped the degree because of cost or time, the federal government’s door just got a little wider for you. For example, an experienced system administrator who holds several high-level security certifications but never finished college can now compete on equal footing for a federal Chief Information Security Officer (CISO) role, provided their skills match the job description.
On the flip side, this puts pressure on agencies to get hyper-specific about what skills they actually need, rather than relying on the easy, albeit often irrelevant, credential filter. The Office of Personnel Management (OPM) is now tasked with annual reporting duties. Within a year of the bill’s passage, and every year after, OPM must publish any changes to education standards and, crucially, data showing the educational backgrounds of the people they actually hire. This transparency is key—it lets the public see whether agencies are truly prioritizing skills over credentials.
While this bill aims to broaden the talent pool and prioritize practical skills, it does introduce a couple of wrinkles. First, it limits the autonomy of specialized agencies that might genuinely feel a baseline academic background is essential for highly theoretical or research-intensive security roles. If they can’t point to a local law requiring a degree, they can’t mandate one, even if they believe it’s necessary for foundational knowledge. Second, the requirement that education must “directly prove” skills is a bit vague. It forces agencies to define competencies precisely, which is good, but if they mess up that definition, they could introduce new, subjective barriers to hiring. Ultimately, this bill is a major step toward skills-based hiring in government, but its success will hinge entirely on how well OPM and individual agencies define and measure those skills in the real world.