Are you an emerging or network professional who wants to work our nation's tough cybersecurity problems and protect our nation? The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to sensitive classified national security information. Cryptographic Vulnerability Analysts at NSA need strong problem-solving, analytic, communication and interpersonal skills and should be: - Accountable - Customer and results oriented - Work effectively independently and/or within teams - Motivated - Flexible - Innovative - Work effectively across in diverse environments - Well-organized - Handle multiple assignments
Cryptographic Vulnerability Analysts analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all.
The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Mathematics, Engineering, Computer Science, or any degree that includes at least 2 years (i.e., 24 credit hours) of advanced mathematics. Relevant experience must include at least one of the following: design, development, use and evaluation of mathematics models, methods, or techniques (e.g., cryptographic algorithms) to study issues and solve problems; vulnerability analysis, penetration testing, or computer forensics. In addition, experience may include information/cyber/network security and/or information assurance. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
We are looking for entry to experienced level professionals who possess strong problem solving, analytical, communication and interpersonal skills; and have knowledge or experience in the following areas: - Analyzing problems to determine technical solutions. - Deciding what procedures will be required to solve technical problems. - Evaluating technical proposals. - Identifying new applications of known techniques. - Analyzing data using mathematical/statistical methods. - Analyzing new algorithms and protocols. - Evaluating solution designs. - Applying mathematical or computational methods and lines of reasoning. - Creating and maintain documentation on technical information. - Documenting research processes, analyses and/or the results. - Writing logical and accurate technical reports to communicate ideas across the enterprise. - Ensuring secure transmission by designing, evaluating, or modifying encryption schemes or algorithms. - Conducting security evaluations of hardware or software components or architectures. - Evaluating methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them. - Developing mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services.
Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position. This position is hiring for Maryland. Salary range: $77,745 - $122,459 (Entry, Full Performance) On-the job training, internal NSA courses, and external training will be made available based on the need and experience of the selectee. Work Schedule: Monday - Friday, with basic 8 hr/day work requirements between 0600 to 1800 (flexible). Some positions may require shift work or being on call.