You are viewing a preview of this job. Log in or register to view more details about this job.

Cryptographic Vulnerability Analyst - Entry to Mid Level (MD, TX)

Responsibilities

Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you! Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by: - identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods - conducting security evaluations - developing countermeasures to address cryptographic vulnerabilities - designing, evaluating or modifying encryption schemes or algorithm The ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can: - motivated - flexible - innovative - work effectively across in diverse environments - well-organized - handle multiple assignments

Job Summary

Are you a cyber professional with the drive and expertise to be on the forefront of the cyber fight; tackling NSA's complex mission to defend against cyber threats of today and tomorrow? NSA, the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help secure our Nation's critical Infrastructure? If so, NSA is the place for you!

Qualifications

The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Mathematics, Engineering, Computer Science or any degree that includes at least 2 years (i.e., 24 credit hours) of advanced mathematics. Relevant experience must include at least one of the following: design, development, use and evaluation of mathematics models, methods, or techniques (e.g., cryptographic algorithms) to study issues and solve problems; vulnerability analysis, penetration testing, or computer forensics. In addition, experience may include information/cyber/network security and/or information assurance. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.

Competencies

- Analyze problems to determine technical solutions. - Decide what procedures will be required to solve technical problems. - Evaluate technical proposals. - Identify new applications of known techniques. - Analyze data using mathematical/statistical methods. - Analyze new algorithms and protocols. - Evaluate solution designs. - Apply mathematical or computational methods and lines of reasoning. - Create and maintain documentation on technical information. - Document research processes, analyses and/or the results. - Write logical and accurate technical reports to communicate ideas across the enterprise. - Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms. - Conduct security evaluations of hardware or software components or architectures. - Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them. - Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services.