Are you an emerging or network professional who wants to work our nation's tough cybersecurity problems and protect our nation? The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to sensitive classified national security information. Cryptographic Vulnerability Analysts at NSA need strong problem-solving, analytic, communication and interpersonal skills and should be: - Accountable - Customer and results oriented - Work effectively independently and/or within teams - Motivated - Flexible - Innovative - Work effectively across in diverse environments - Well-organized - Handle multiple assignments
Cryptographic Vulnerability Analysts analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all.
The qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Mathematics, Engineering, Computer Science, or any degree that includes at least 2 years (i.e., 24 credit hours) of advanced mathematics. Relevant experience must include at least one of the following: design, development, use and evaluation of mathematics models, methods, or techniques (e.g., cryptographic algorithms) to study issues and solve problems; vulnerability analysis, penetration testing, or computer forensics. In addition, experience may include information/cyber/network security and/or information assurance. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
We are looking for entry to experienced level professionals who possess strong problem solving, analytical, communication and interpersonal skills; and have knowledge or experience in the following areas: - Analyzing problems to determine technical solutions. - Deciding what procedures will be required to solve technical problems. - Evaluating technical proposals. - Identifying new applications of known techniques. - Analyzing data using mathematical/statistical methods. - Analyzing new algorithms and protocols. - Evaluating solution designs. - Applying mathematical or computational methods and lines of reasoning. - Creating and maintain documentation on technical information. - Documenting research processes, analyses and/or the results. - Writing logical and accurate technical reports to communicate ideas across the enterprise. - Ensuring secure transmission by designing, evaluating, or modifying encryption schemes or algorithms. - Conducting security evaluations of hardware or software components or architectures. - Evaluating methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them. - Developing mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services.
Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position. This position is hiring for Maryland. Salary range: $77,745 - $122,459 (Entry, Full Performance) On-the job training, internal NSA courses, and external training will be made available based on the need and experience of the selectee. Work Schedule: Monday - Friday, with basic 8 hr/day work requirements between 0600 to 1800 (flexible). Some positions may require shift work or being on call.
U.S. Citizenship is required for all applicants. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph. Due to time sensitive communications regarding your application, please ensure your spam filters are configured to accept email from firstname.lastname@example.org. Please review the job posting thoroughly to ensure you meet the described qualifications and are aware of all associated requirements. To apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. We encourage you to apply as soon as possible, as job postings could close earlier than the closing date due to sufficient number of applicants, or the position is no longer available. You may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the application screening process and will assist in determining your eligibility for the position. Be sure to showcase within your resume those experiences relevant to this position. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet all position qualifications, may be contacted to begin employment processing. Please remain diligent in monitoring email and your SPAM folder. Reasonable accommodations may be provided to applicants with disabilities during the application and hiring process where appropriate. Please visit our Diversity link for more information. This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.