Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make an impact in cybersecurity and advance your career while enjoying the outstanding benefits of federal service? Network Cyber Mitigations Engineers and System Vulnerability Analysts at NSA have the opportunity to work in the following areas: - Wired and wireless network security - Vulnerability discovery and analysis - Scalable mitigations development - Perimeter/boundary defense - Collaboration platforms, such as VoIP and VTC systems - Mobile network security - Tailored security solutions - Reverse engineering - Researching emerging network industry technologies and solutions - Control system security - Malware analysis - Researching emerging network industry technologies and solutions - Ensuring adequacy of cybersecurity standards and configurations - Fusing vulnerability assessments from all sources into a unified picture of network risk
Network Cyber Mitigations Engineers and System Vulnerability Analysts analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Start your career as a Network Cyber Mitigations Engineer/System Vulnerability Analyst at NSA, where you can become an expert in networking protocols and architectures, cloud security, and Internet of Things protocols, to impact and advance traditional network security.
The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, or information assurance. Network and/or system administration may account for some, but not all, of the required experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. EXPERT Entry is with a Bachelor's degree plus 9 years of relevant experience, or a Master's degree plus 7 years of relevant experience, or a Doctoral degree plus 5 years of relevant experience. An Associate's degree plus 11 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
We're looking for entry and experienced professionals who possess strong problem solving, analytical, communication and interpersonal skills; and have knowledge or experience in the following areas: - Defending against and/or mitigating system vulnerabilities related to network infrastructure devices and boundary defense - Network device operating systems, functionality and configuration - Network architecture and protocols - Port, protocol and services analysis - Network segmentation - Network traffic analysis - Vulnerability detection, analysis and mitigations development - Reverse engineering - Fuzzing and penetration testing - Scripting languages, such as Python - Software defined networking - Cellular technology, including 5G - Authentication mechanisms
Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position. Salary ranges vary by location and work level. This position is hiring for Maryland. Salary Range: $77,745 - $183,500 (Entry/Developmental, Full Performance, Senior, Expert levels) On-the job training. Internal NSA courses, and external training will be made available based on the need and experience of the selectee. Typical work schedule is Monday - Friday, with basic 8 hr/day work requirements between 0600 and 1800 (flexible).
U.S. Citizenship is required for all applicants. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Due to time sensitive communications regarding your application, please ensure your spam filters are configured to accept email from email@example.com. Please review the job posting thoroughly to ensure you meet the described qualifications and are aware of all associated requirements. To apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. We encourage you to apply as soon as possible, as job postings could close earlier than the closing date due to sufficient number of applicants, or the position is no longer available. You may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the application screening process and will assist in determining your eligibility for the position. Be sure to showcase within your resume those experiences relevant to this position. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet all position qualifications, may be contacted to begin employment processing. Please remain diligent in monitoring email and your SPAM folder. Reasonable accommodations may be provided to applicants with disabilities during the application and hiring process where appropriate. Please visit our Diversity link for more information. This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.