Global Network Exploitation and Vulnerability Analyst Job in Fort George G Meade, Maryland US

Responsibilities

The National Security Agency charges the Tailored Mitigation Office (TMO) within NSA's Information Assurance Directorate to fundamentally strengthen our National Cyber-security by driving development and adoption of comprehensive, threat-based risk reductions, transforming concepts into relevant, implementable, and scalable defenses. It focuses on understanding the Cyber threats facing our Nation and assuring that there are appropriate mitigations in place to effectively address them. The TMO partners with the larger CND community to gain that understanding and directly with IAD's customers to guide the integration of those mitigations within their networks.

There are a number of functions that come together to provide this critical service to the Department of Defense. These include, but are not limited to, developing, testing, and piloting mitigations to help secure the following:

- Host-based systems,
- Network infrastructures,
- IAD's Mobility effort, and
- Supervisory Control and Data Acquisition (SCADA) systems.

Additionally, TMO analysts will be called upon to provide mitigations support to cyber intrusions affecting DoD customers and partners.

Specifically, the TMO is looking to fill the following position:

Global Network Exploitation and Vulnerability Analyst (GNEVA): Protect computer network systems by identifying vulnerabilities and potentials for cyber intrusions. Discover methods of protecting global networks, computer systems, or specific hardware or software. Design, demonstrate, develop, implement, or update protection methods and recommend mitigations strategies and techniques.

.

Qualifications

An ideal candidate will possess the following:

Expertise in the following:
- malware and other Cyber threats
- host-based mitigation technologies
- network-based mitigation technologies
- mobile computing technologies
- architecting secure systems
- host and network administration
- intrusion response activities
- network monitoring
- web application security
- Ability to work in a teaming environment and willingness to lead team efforts.
- Strong written and oral communications skills
- Programming and software reverse engineering experience
- Penetration testing experience
- Knowledge of DoD networks and the capabilities deployed to secure them

Certifications, to include CISSP, NET+, Security+, or other relevant experience shall also be considered.

Entry is with a high school diploma and 3 years of experience, or an Associate's degree and 1 year of experience, or a Bachelor's degree.
Degree must be in Computer Science (Information Systems, Computer Technology and IFSM degrees will not automatically qualify). If degree is in a related area (e.g., Engineering, Mathematics), it must contain appropriate qualifying college-level courses to fulfill the MQ. Upper level classes include: Analysis of Algorithms, Artificial Intelligence, Automata Theory and Formal Languages, Circuit Theory, Communications Engineering, Compiler Design/Theory, Computer Architectures, Computer Cryptography, Computer Engineering, Computer Forensics, Computer Network Architecture and Protocols, Data Communications Networks, Database Design, Data Mining, Digital Communications, Digital Signals Processing, Discrete Structures, Dynamic Systems, Electrical Circuits and Systems, Machine learning, Network Security, Neural Networks, Object Oriented Analysis and Design, Operating Systems Theory, Principles of VLSI Design, Programmable Logic Devices, Programming Languages Theory, Robotics, Signals and System Theory, Software Engineering, System Architecture, and Design, Systems Design and Programming. Also, Introductory courses in Computer Science, Circuit Design, Data Structures, Database Systems, Database administration, Database programming, Digital Design, Electrical Engineering, Microprocessors, Network Administration, Programming courses ' any language, Scripting/Query Languages (such as Perl or SQL), System Administration, Web programming, and a foundational low-level class required for an upper-level course. OR one or more of the following types of experience:
Relevant NSA Professional AAC experience.
Experience which is clearly professional Computer Science practice that is commensurate with the college-level coursework described above (e.g., network administration, database management, artificial intelligence).
Experience working in a security domain.
Experience with systems-level programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, troubleshooting.

.

Pay, Benefits, Work Schedule

Salary is commensurate with education and experience.

Salary range: $42,209 - $97,333

.

How To Apply - External

To apply for this position, please click the 'Apply Now' button located at the top or bottom of this page. After completing the application and clicking the `Submit Final' button, you will receive a confirmation email. Emails regarding your application status will be sent periodically. Please ensure your spam filters are configured to accept emails from noreply@nsa.gov

***PLEASE NOTE:

U.S. Citizenship is required for all applicants. Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.

.

DCIPS Disclaimer

The National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.

.