Job Details

ID #19592823
State Maryland
City Fortmeade
Job type Permanent
Salary USD TBD TBD
Source National Security Agency
Showed 2021-09-14
Date 2021-09-13
Deadline 2021-11-11
Category Security
Create resume

Cryptographic Vulnerability Analyst - Entry/Mid-Level

Maryland, Fortmeade, 20755 Fortmeade USA

Vacancy expired!

Position SummaryAre you a cyber professional with the drive and expertise to be on the forefront of the cyber fight; tackling NSA's complex mission to defend against cyber threats of today and tomorrow? NSA, the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help secure our Nation's critical Infrastructure? If so, NSA is the place for you!DCIPS DisclaimerThe National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.How To Apply - ExternalTo apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. Please ensure your spam filters are configured to accept emails from noreply@intelligencecareers.gov.

PLEASE NOTE: U.S. Citizenship is required for all applicants. Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.

This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.

Please note that you may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the screening process of your application and will assist in determining your eligibility for the position. Be sure to elaborate on experiences in your resume. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet the qualifications for the position will be contacted to begin employment processing.

Please Note: Job Posting could close earlier than the closing date due to sufficient number of applicants or position no longer available. We encourage you to apply as soon as possible.Pay, Benefits, & Work ScheduleThis is a full-time position, Monday through Friday.Skills- Analyze problems to determine technical solutions.- Decide what procedures will be required to solve technical problems.- Evaluate technical proposals.- Identify new applications of known techniques.- Analyze data using mathematical/statistical methods.- Analyze new algorithms and protocols.- Evaluate solution designs.- Apply mathematical or computational methods and lines of reasoning.- Create and maintain documentation on technical information.- Document research processes, analyses and/or the results.- Write logical and accurate technical reports to communicate ideas across the enterprise.- Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms.- Conduct security evaluations of hardware or software components or architectures.- Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them.- Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services.ResponsibilitiesThe professionals at the National Security Agency (NSA) have one common goal: to protect our nation. The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to sensitive classified national security information.

Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you!

Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by:

- identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods- conducting security evaluations- developing countermeasures to address cryptographic vulnerabilities- designing, evaluating or modifying encryption schemes or algorithm

The ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can:

- motivated - flexible- innovative- work effectively across in diverse environments- well-organized- handle multiple assignments

Vacancy expired!

Subscribe Report job