Job Details

ID #23582252
State Maryland
City Fortmeade
Job type Permanent
Salary USD TBD TBD
Source National Security Agency
Showed 2021-11-28
Date 2021-11-27
Deadline 2022-01-26
Category Security
Create resume

Cyber Mitigations Analyst/System Vulnerability Analyst - Entry to Expert Level (Multiple Locations - Maryland and Texas)

Maryland, Fortmeade, 20755 Fortmeade USA

Vacancy expired!

Position SummaryAre you a cyber professional with the drive and expertise to be on the forefront of the cyber fight; tackling NSA's complex mission to defend against cyber threats of today and tomorrow? NSA, the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help secure our Nation's critical Infrastructure? If so, NSA is the place for you!DCIPS DisclaimerThe National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.How To Apply - ExternalTo apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. Please ensure your spam filters are configured to accept emails from noreply@intelligencecareers.gov.

PLEASE NOTE: U.S. Citizenship is required for all applicants. Additionally, the Federal Government requires all personnel to be fully vaccinated at the time of employment, subject to exceptions as required by law.

Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.

This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.

Please note that you may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the screening process of your application and will assist in determining your eligibility for the position. Be sure to elaborate on experiences in your resume. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet the qualifications for the position will be contacted to begin employment processing.

Please Note: Job Posting could close earlier than the closing date due to sufficient number of applicants or position no longer available. We encourage you to apply as soon as possible.Pay, Benefits, & Work ScheduleOn-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee.

Work Schedule: Monday - Friday, with basic 8hr/day work requirements between 0600 to 1800 (flexible).SkillsThe Ideal Candidate

We're looking for entry and experienced professionals who possess strong problem solving, analytical, communication and interpersonal skills; and have knowledge or experience in the following areas:

- Defending against and/or mitigating system vulnerabilities related to network infrastructure devices and boundary defense- Network device operating systems, functionality and configuration- Network architecture and protocols- Port, protocol and services analysis- Network segmentation- Network traffic analysis- Vulnerability detection, analysis and mitigations development- Reverse engineering- Fuzzing and penetration testing- Scripting languages, such as Python- Software defined networking - Cellular technology, including 5G- Authentication mechanismsResponsibilitiesThe NSA Story

The National Security Agency (NSA) exists to obtain insight into foreign adversaries' plans and intentions and protect our U.S. cybersecurity interests. We provide national security insights and threat warnings to government decision-makers and eradicate cybersecurity threats.

How You Can Contribute

Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make an impact in cybersecurity and advance your career while enjoying the outstanding benefits of federal service?

Network cyber mitigations engineers and system vulnerability analysts at NSA analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. Our analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Start your career as a Network Cyber Mitigations Engineer/System Vulnerability Analyst at NSA, where you can become an expert in networking protocols and architectures, cloud security, and Internet of Things protocols, to impact and advance traditional network security.

Responsibilities

- Wired and wireless network security- Vulnerability discovery and analysis - Scalable mitigations development- Perimeter/boundary defense- Collaboration platforms, such as VVoIP and VTC systems- Mobile network security - Tailored security solutions- Reverse engineering- Researching emerging network industry technologies and solutions - Control system security- Malware analysis- Researching emerging network industry technologies and solutions- Ensuring adequacy of cybersecurity standards and configurations- Fusing vulnerability assessments from all sources into a unified picture of network risk

Vacancy expired!

Subscribe Report job