Responsibilities The professionals at the National Security Agency (NSA) have one common goal: to protect our nation. The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to classified national security information.
The need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission. The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems.
Digital Network Exploitation Analysts employ computer science skills to perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysis are hired into positions directly supporting a technical mission office or the Digital Network Exploitation Analyst (DNEA) Development Program ' a 3 year development program that combines formal training (i.e., SIGINT, discovery/analysis, and advanced cyber security) and diverse work assignments.
As a Digital Network Exploitation Analyst at the NSA, responsibilities may include:
- conducting analysis of metadata
- conducting target analysis and research
- identifying target communications within the global network
- performing global network analysis and mapping
- using knowledge of customer requirements to analyze and process intelligence information
- performing exploitation and operations on target networks Skills The ideal candidate is someone with a desire for continual learning and strong problem-solving, analytic and interpersonal skills who is:
- flexible
- able to communicate effectively
- able to collaborate with others
Specialized skills and experience in one or more of the following is desired:
- Knowledge of network protocols (especially TCP/IP, VOIP, wireless protocols)
- Understanding of Internet
- Understanding of WAN and LAN
- Vulnerability analysis
- Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python) Qualifications Salary Range: $68,586 - $85,464 (Entry/Developmental)
*The qualifications listed are the minimum acceptable to be considered for the position. Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.
Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science (CS). Related fields (e.g., Engineering, Mathematics) may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) or Information Systems (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major.
Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering and/or network and system administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).
Salary Range: $79,334 - $105,663 (Full Performance)
*The qualifications listed are the minimum acceptable to be considered for the position. Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.
Entry is with a Bachelor's degree plus 3 years of relevant experience or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.
Degree must be in Computer Science (CS). Related fields (e.g., Engineering, Mathematics) may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) or Information Systems (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major.
Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering and/or network and system administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). Pay, Benefits, & Work Schedule On-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee.
by via developer jobs - Stack Overflow
No comments:
Post a Comment