Skip to main content

Cybersecurity

Cybersecurity Statistics

33
Students have gone into cybersecurity since 2021
$86k
BSIS Starting Salary (AVG)
$96k
MISM Starting Salary (AVG)
Cybersecurity Statistics
Cybersecurity Students
Total Students
0%
0%

Companies that Hire for Development

Career Outcomes

A list of possible Career Outcomes

Security Professional

Security professionals monitor intrusion detection systems, analyze log data for suspicious activity, investigate and research emerging security threats, and evaluate system vulnerabilities. Protecting information security systems today takes advanced training; candidates for sought-after positions must possess up-to-date knowledge and sharp skills.

Risk Assurance

Risk Assurance employees analyze a company’s systems to assure that they are following national regulations and security guidelines. They work with Audit professionals to create trust and confidence in financial reporting and internal control within an organization, and assess risks and controls related to business imperative.
Cybersecurity Jobs

MIS Intern, Enterprise & Cloud at equitar

April 25, 2024 04:01 AM
Employer: equitar Expires: 10/24/2024 MIS Intern, Enterprise & CloudYour Next Career Opportunity with equitarWe’re offering exceptional compensation and benefits for a junior professional who’s ready to develop and support our Management Information Systems- and who’s passionate about delivering results.You’ll have the opportunity to advance your professional development with industry-leading education, training, and certifications. And you'll work in our fabulous La Jolla UTC (San Diego, CA) offices-or in one of our regional offices (e.g., Tampa, FL)- with paid parking and a convenient walk to fitness clubs, shopping, and restaurants.Achieve New Milestones of Professional SuccessIn this junior professional role, you’ll be responsible for:Supporting the development and implementation of our contemporary Management Information Systems (“MIS”) and Enterprise Application Stack, architected to deliver performance and scalability into our high-growth, distributed technology enterpriseSupporting enterprise Cybersecurity Security Operations (“Cyber SecOps”), comprising contemporary approaches to privacy, identity, observability, security hygiene, and incident responseSupporting the writing, production, and content management of procedures, policies, work instructions, and guidance, in support of the information governance and deployment of our MIS and Cyber SecOpsDaily management and tracking of your projects, tasks, and milestones through your effective use of our Project and Program Management Systems (e.g., Microsoft Planner)A demonstrable commitment to your continuous professional development, including developing and maintaining the requisite skills to effectively utilize state-of-the-art business and productivity applications, management information systems, and office equipment.  (Ongoing testing and certifications may be expected.)Build Upon Your Track RecordIdeal candidates will have a proven track record of professional responsibility in the business workplace, supporting management, and delivering results, including:3+ years of experience in the business workplace, with demonstrable, positive results.  (Low-experience candidates committed to accelerated professional development will also be considered.)The knowledge of theories, principles, and concepts typically acquired through completion of a Bachelor's degree in Management Information Systems or a related fieldExcellent leadership and decision-making skillsExcellent communication (both oral and written), interpersonal, and presentation skillsExcellent time management, planning, and teamwork skillsA passion for building and scaling high-performance business processes and systemsDemonstrable understanding of contemporary MIS, cybersecurity, productivity, customer relationship management, creative, and content management applications (e.g., Microsoft 365, Microsoft Dynamics, Microsoft Power Platform, Crowdstrike, etc.)Accelerate Your Professional Development.We offer exceptional opportunities for accelerated career growth, high-performance teamwork, industry leadership, and professional development for applicants with the passion, aptitude, and stamina to consistently deliver exceptional results.equitar is an Equal Opportunity Employer.Equitar Technologies, Inc. is an equal opportunity employer.  All qualified applicants will receive consideration for employment without regard to race, color, gender, sexual orientation, gender identity or expression, religion, national origin, marital status, age, disability, veteran status, genetic information, or any other protected status.Apply Today!  Contact us via careers@equitar.io

Cybersecurity Intern at Booz Allen Hamilton Inc

April 25, 2024 04:01 AM
Employer: Booz Allen Hamilton Inc Expires: 10/24/2024 Job Number: R0195694 University, Cybersecurity InternKey Role:Work as part of an innovative team on various aspects of the cybersecurity field. Participate in cybersecurity services, training, and research and organize best practices for cyber logging, incident detection and response, and engineering standards. Contribute to assigned cybersecurity tasks for the entire semester. Assist with programming and scripting, while learning to work with hardware and software and various aspects of the software development life cycle. Work with assigned Integrated Product Team, mentor, and job leader. Basic Qualifications:Experience with cybersecurity principlesKnowledge of Linux and Windows systemsAbility to obtain a security clearanceScheduled to obtain a Bachelor's degree by Spring 2026 Additional Qualifications:Knowledge of embedded systems conceptsAbility to leverage expertise in technical writing and presentations  Ability to review software source code against secure coding standardsAbility to analyze documentation, including design documents, architecture diagrams, and interface control documents (ICD), for potential security vulnerabilities Clearance:  Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. 

Digital Network Exploitation Analyst - Entry to Experienced Level (MD, HI)

April 25, 2024 04:00 AM
ResponsibilitiesThe need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission. The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems. Digital Network Exploitation Analysts employ computer science skills to perform discovery and target technology analysis of digital network and mobile communications. Digital Network Exploitation Analysts are hired into positions directly supporting a technical mission office or an Agency Development Program. Both the Digital Network Exploitation Analyst (DNEA) Development Program (DDP) and the Intrusion Analyst Skill Development Program (IASDP) are 3 year programs that combine formal training (i.e., SIGINT, discovery/analysis, and advanced cyber security) and diverse work assignments. As a Digital Network Exploitation Analyst at the NSA, responsibilities may include: - conducting analysis of metadata - conducting target analysis and research - identifying target communications within the global network - performing global network analysis and mapping - using knowledge of customer requirements to analyze and process intelligence information - performing exploitation and operations on target networksJob SummaryNSA is in search of Computer Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. Apply your computer science expertise to projects that seek to create new standards for the transformation of information. If you want to develop technologies and tools and be a part of cutting edge innovations, join our team of experts! Help protect national security interests as part of the world's most advanced team of computer science professionals!QualificationsThe qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Computer Science (CS). Related fields (e.g., Engineering, Mathematics, Information Technology or Systems, Cybersecurity, Information Assurance or Security, Networking and Telecommunications) may be considered relevant if the programs contain, at minimum, a concentration of courses in the following: algorithms; computer architecture or network architecture; data structures; logic and computation; and advanced mathematics (for example, calculus, discrete mathematics). Relevant experience must be in computer or information systems design/development/analysis. In addition, relevant experience may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, cybersecurity, systems engineering and/or network and system administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience or a Master's degree plus 4 years of relevant experience or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.CompetenciesThe ideal candidate is someone with a desire for continual learning and strong problem-solving, analytic and interpersonal skills who is: - flexible - able to communicate effectively - able to collaborate with others Specialized skills and experience in one or more of the following is desired: - Knowledge of network protocols (especially TCP/IP, VOIP, wireless protocols) - Understanding of Internet - Understanding of WAN and LAN - Vulnerability analysis - Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python)

Operations and Support Intern (ASG Intern) at Bugcrowd

April 20, 2024 04:00 AM
Employer: Bugcrowd Expires: 10/19/2024 Company SummaryWe are Bugcrowd. Since 2012, we’ve been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI-powered Security Knowledge Platform™. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero-day exploits. With unmatched scalability and adaptability, our data and AI-driven CrowdMatch™ technology in our platform finds the perfect talent for your unique fight. We aim to create a new era of modern crowdsourced security that outpaces threat actors. Unleash the ingenuity of the hacker community with Bugcrowd, visit www.bugcrowd.com. Based in San Francisco, Bugcrowd is supported by Rally Ventures, Costanoa Ventures, Blackbird Ventures, Triangle Peak Partners, and others.Job SummaryBugcrowd is looking for a creative, enterprising, and intrinsically motivated intern to join our growing Advanced Security Group team. The Operations and Support Intern is a dynamic role designed to support the Advanced Security Group (ASG) in streamlining day-to-day operations. The successful candidate will be pivotal in enhancing the department’s efficiency, ensuring that administrative and operational tasks are executed effectively. As an Operations and Support Intern, you’ll work with multiple internal roles including Technical Pentest Managers, Pentest QA Techs, Report Writers, and Management. The position is to provide aid and assistance to each area as required in duties that cover data-entry, documentation, and minor project management.The ideal candidate for this role will have flexibility in skills and the ability to transition between tasks with minimal notice. They will have strong English verbal and written skills and the ability to operate with little supervision in a proactive manner. Having an interest in or experience with cybersecurity is strongly preferred.Essential Duties and Responsibilities Documentation Updates:Transcribe and update documentation accurately from meeting recordings, ensuring all notes and action items are documented, and information is easily accessible.General Operations Assistance:Support the Director of ASG Department in executing operational tasks, including but not limited to scheduling, coordination, and administrative support.Ad-Hoc Support:Take on tasks that fall outside the normal scope of operations, ensuring the team is able to focus on strategic and core operational functions. Act as a personal assistant when required. EducationRequired/PreferredEducationDescription Knowledge, Skills, and AbilitiesAttention to Detail: Ensuring accuracy in documentation and data.Communication: Articulating information clearly and effectively.Time Management: Prioritizing tasks to manage time effectively.Adaptability: Adjusting to the changing needs of a dynamic environment. Working Conditions and Physical RequirementsThe ideal candidate must be able to complete all physical requirements of the job with or without reasonable accommodation.Sitting and / or standing - Must be able to remain in a stationary position 50% of the timeCarrying and / or lifting - Must be able to carry / move laptop as needed throughout the work day.Environment - remote, work-from-home 100% of the time. CompensationThe base pay range for this role takes into account the wide range of factors that are considered in making compensation decisions, including but not limited to Qualifications, Geographical Location, Education/certifications, Experience, Skill Sets, Training, and other business and organizational needs. A reasonable estimate of the current range for interns is: $20 - $25 an hour USDCultureAt Bugcrowd, we understand that diversity in the workplace is vital to a company’s success and growth. We strive to make sure that people are included and have a sense of being part of making Bugcrowd not only a great product but a great place to work.We regularly hear from both customers and researchers that Bugcrowd feels like a family, and we strive to maintain that internally as well.Our team consists of a broad range of people: musicians, adventure sports junkies, nature lovers, parents, cereal enthusiasts, night owls, cyclists, artists—you get the point.At Bugcrowd, we are solving security threats and vulnerabilities that are relevant to everyone, therefore we believe solving these problems takes all kinds of backgrounds. We value the perspectives and experiences people from underrepresented backgrounds bring. We are a supportive & collaborative team who understand that reaching Bugcrowd’s potential depends on the happiness of the employee.DisclaimerThis position has access to highly confidential, sensitive information relating to the technologies of Bugcrowd. It is essential that the applicant possess the requisite integrity to maintain the information in the strictest confidence.The company is authorized to obtain background checks for employment purposes under state and federal law. Background checks will be conducted for positions that involve access to confidential or proprietary information (including trade secrets).Background checks may include Social Security verification, prior employment verification, personal and professional references, educational verification, and criminal history. Applicants with conviction histories will not be excluded from consideration to the extent required by law.Equal Employment Opportunity:Bugcrowd is EOE, Disability/Age Employer. Individuals seeking employment at Bugcrowd are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation. Apply at: https://www.bugcrowd.com/about/careers/ 

Network System Engineer - Entry to Experienced Level (CO, HI, MD, UT)

April 16, 2024 04:00 AM
ResponsibilitiesNetwork Professionals are hired into positions directly supporting a technical mission office or one of the different development programs like the Applied Computing Development Program (ACDP). We are hiring entry to senior networking professionals with education and/or experience in several of the following areas: - Multi-vendor infrastructure platforms (i.e., Cisco, Brocade, Juniper, Arista) - Network encryption devices and WAN accelerators - Multi-vendor Layer 3 routing protocols (i.e., BGP, OSFP, EIGRP, IGRP, HSRP, VRRP) - Virtual Private Networking (i.e., MPLS, GRE, L2VPN, EVPN, Pseudowire, IPsec, MACSEC) - Data center architectures and converged networks - Current networking trends, including commercial implementations of Software Defined Networks (SDN) for both Data Center Network and WAN applications - Load balancing and Application Delivery Controller technologies and implementations - WAN architectures (i.e., Carrier Ethernet, Optical Fabrics (OTN), SONET) - Network monitoring tools (i.e., NetFlow Tracker, HP Network Node Manager, Cisco LMS, Cisco Call Manager, Wireshark, and Splunk) - Network Modeling (RiverBed/OPNet, NetSim) - Network Boundary (Next Generation Firewalls (Palo Alto, Cisco FIREPOWER), IPSEC/SSL VPN Concentrators) - Cross Domain Solutions (SafeNet MDeX System, OWL Cyber Defense Cross Domain Solutions) - Technical certifications (e.g., CCNA, CCNP, SEC+). The ACDP is a three-year full-time development program. The goal of the program is to provide entry-level information technology specialists (that is, individuals with degrees in computer science, information systems, information technology, and related degrees and experience) the opportunity to learn the various facets of the mission. These facets include: - Development, engineering and deployment of NSA mission systems - Architecture, development, building, and maintenance of NSA's fault-tolerant world-wide information technology infrastructure - High-performance computing system development for cryptanalytic mission applications - Human resources, financial, and other business data warehouse storage and access - Information system security, engineering, testing, and evaluation.Job SummaryThe National Security Agency is seeking for results driven individuals that strive for excellence, enjoy the challenges of a fast paced environment and the desire to make a difference. We are looking for talented networking professionals to design, develop, deploy, sustain and monitor state-of-the-art network solutions (WAN, CAN, LAN, DCN and Satellite communications networks) that are deployed across NSA worldwide.QualificationsThe qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Relevant experience must be in network or system administration. Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 2 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 2 years of relevant experience. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 5 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 5 years of relevant experience. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 8 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 8 years of relevant experience.CompetenciesThe ideal candidate is someone with excellent problem-solving, communication and interpersonal skills who is/can: - Motivated - Flexible - Innovative - Work effectively in diverse environments - Well-organized - Handle multiple assignments Other desired skills and certifications: - Network Security - Network Routing and/or Switching - Risk Management Framework (RMF) - Certification (CCNA, CCNP, CCNA Security, CISSP, ISSP) - Computer Security - Threat analysis - Cybersecurity

2024 High Performance Computing Modernization Program (HPCMP) Summer Program: Machine Learning For Army Aviation Concepts at Oak Ridge Institute for Science and Education

April 13, 2024 04:01 AM
Employer: Oak Ridge Institute for Science and Education Expires: 10/12/2024 Reference CodeHPCMP-HIP-2024-037DescriptionAbout High Performance Computing Modernization Program (HPCMP)The Department of Defense’s (DoD) High Performance Computing Modernization Program (HPCMP) sponsors two summer research opportunities: the High-Performance Computing Internship Program (HIP) and the Faculty Immersion Experience (FIX). These 10-week experiences are offered in collaboration with more than a dozen DoD hosting organizations nationwide. Both programs seek to strengthen DoD and academic collaboration, enhance research capabilities, and encourage broader university-level participation in high-end computing.The Department of Defense (DoD) established the High Performance Computing Modernization Program [hpc.mil] (HPCMP) as a department-wide program to provide DoD scientists, engineers, and acquisition engineering professionals with the computational resources needed to develop robust solutions to complete technical challenges.About ERDC-ITLAt the US Army Engineer Research & Development Center’s Information Technology Laboratory, we lead research and development in informatics, computational science, and computational engineering with an emphasis on high-performance computing, computer-aided and interdisciplinary engineering, computer science, systems engineering, and instrumentation systems.What will I be doing?Under the guidance of a mentor, you will research with the High-Performance Computing for Army Aviation Concepts program at U.S. Army Engineer Research and Development Center’s (ERDC) Information Technology Laboratory (ITL) to develop machine learning solutions for physics-based simulation and trade space development. You will be exploring the application of physics-informed machine learning approaches to various topic areas including simulation of rotor blades with the goal of significantly reducing the time required to simulate rotations of the blade while preserving accuracy of the rotor wake. You will also be exploring the application of machine learning as surrogate models.Why should I apply?This internship will give you an opportunity to:Learn from and collaborate with scientists and engineers at DoD facilities across the nation.Contribute to significant Research, Development, Test, Evaluation & Acquisitions Engineering activities.Develop critical skills and establish long-term connections.Receive financial support including a stipend and travel allowances.Gain a competitive advantage and improve long-term career opportunities.Where will I be located? Vicksburg, MSWhat is the anticipated start date? May 2024What is the appointment length? This appointment is a 10-week summer research appointment. Appointments may be extended depending on funding availability, project assignment, program rules, and availability of the participant.What are the benefits?Stipend: Participants receive a monthly stipend to help defray living expenses during the appointment. Stipend rates are determined by HPCMP based on the participant’s education level.Dislocation Allowance: A dislocation allowance may be provided for participants who relocate more than fifty miles, one-way, to the designated host site. This includes roundtrip domestic travel to/from the host location.  Participant is responsible for and local transportation prior to arriving at the designated host site.Professional Travel: Participants may be eligible for reimbursement of pre-approved professional travel expenses related to the educational goals of the designated opportunity.Health Insurance: Participants may be eligible to enroll in ORISE health insurance to cover medical, dental and vision insurance.ABOUT ORISEThis program, administered by Oak Ridge Associated Universities (ORAU) through its contract with the U.S. Department of Energy (DOE) to manage the Oak Ridge Institute for Science and Education (ORISE), was established through an interagency agreement between DOE and DoD. Participants do not enter into an employee/employer relationship with ORISE, ORAU, DoD or any other office or agency. Instead, you will be affiliated with ORISE for the administration of the appointment through the ORISE appointment letter and Terms of Appointment.  Proof of health insurance is required for participation in this program. Health insurance can be obtained through ORISE.  For more information, visit the ORISE Research Participation Program at the U.S. Department of Defense.QualificationsBasic programming skills with python preferred.Applicants need to meet the following eligibility criteria at the time of application:Be a U.S. citizen.Be at least 18 years of age.Pursuing an associate or bachelor's degree or received within the last five years in a science, technology, engineering or mathematics (STEM) discipline.Have a cumulative GPA of 3.0 or higher on a 4.00 scale.Applicants should be able to pass a National Agency Check and Inquiries (NACI) security investigation should they be selected and accept the internship offer.A complete application consists of:Zintellect ProfileEducational and Employment HistoryEssay Questions (goals, experiences, and skills relevant to the opportunity)Resume (PDF)Transcripts/Academic Records - For this opportunity, an official transcript or copy of the student academic records printed by the applicant or by academic advisors from internal institution systems may be submitted. Click here for detailed information about acceptable transcripts.One recommendation - We encourage you to contact your recommender(s) as soon as you start your application to ensure they are able to complete the recommendation form and to let them know to expect a message from Zintellect. Recommenders will be asked to rate your scientific capabilities, personal characteristics, and describe how they know you. You can always log back in to your Zintellect account and check the status of your application.Submitted documents must have all social security numbers, student identification numbers, and/or dates of birth removed (blanked out, blackened out, made illegible, etc.) prior to uploading into the application system. All documents must be in English or include an official English translation. If you have questions, send an email to HPCMP@orise.orau.gov. Please list the reference code of this opportunity in the subject line of the email. Please understand that ORISE does not review applications or select applicants; selections are made by the sponsoring agency identified on this opportunity. All application materials should be submitted via the “Apply” button at the bottom of this opportunity listing.  Please do not send application materials to the email address above.Connect with ORISE...on the GO! Download the new ORISE GO mobile app in the Apple App Store or Google Play Store to help you stay engaged, connected, and informed during your ORISE experience and beyond!Eligibility RequirementsCitizenship: U.S. Citizen OnlyDegree: Associate's Degree or Bachelor's Degree received within the last 60 months or currently pursuing.Overall GPA: 3.00Discipline(s):Computer, Information, and Data Sciences (17 )Earth and Geosciences (21 )Engineering (27 )Mathematics and Statistics (11 )Physics (16 )Science & Engineering-related (2 )Age: Must be 18 years of ageVeteran Status: Veterans Preference, degree received within the last 120 month(s).

Engineer/Developer - Software, Hardware, Research (Capabilities Development Specialist) - Entry to Expert Levels (MD, TX, CO)

April 04, 2024 04:00 AM
ResponsibilitiesAre you driven by a passion to work at the cutting edge of technology? Do you dream to make the impossible possible? The National Security Agency is seeking highly motivated Computer Science and Computer/Electrical Engineering professionals to drive its mission to develop new capabilities, design new approaches, help solve complex problems, and research new solutions to propel our mission. As a Capabilities Development Specialist (CDS), your job will be to develop custom high-priority offensive and defensive capabilities targeting the hardest-to-reach adversarial networks in the world. In defense of our Nation, we conduct innovative research and produce hardware and software tools unlike anything in the world. By joining our team, you will apply and grow your expertise to create new ways to get critical information to our national decision makers. Whether it is in software, hardware, or cutting-edge research, if you are up for a challenge, have unbridled curiosity, and a drive to develop tomorrow's technologies and tools today, apply to join our team. Use your unique experiences and expertise to protect national security interests as part of the world's most advanced team of computer science and engineering professionals! If you have interests, skills, or experience in one or more of the following areas, we'd like to hear from you: - Software Specialties: Strong software development skills (C, C++, Assembly, ARM); Software RE/interactive debugging tools (e.g., Ghidra, OllyDbg, gdb); Software application vulnerability analysis and exploitation; Operating system internals; Mobile platform development and analysis; algorithmic analysis; prototyping. - Malware Reverse Engineer: Perform advanced malware analysis/reverse engineering of specialized malware/complex files. CISSP, CEH, GREM, GPEN certifications are a plus. - Hardware Specialties: - Hardware RE, design, development, or testing (Verilog, VHDL, FPGA, PCB); Testing and debugging tools (JTAG, Oscilloscopes, etc.); Job roles may include: - Developing exploitation capabilities and analytics to enable foreign target network collection - Designing hardware components and systems to further signals intelligence missions - Analyzing sophisticated malwareJob SummaryAre you a computer science or computer/electrical engineering professional? Do you have strong software or hardware design, development, testing or reverse engineering skills? Do you want to be part of a team that develops ground breaking solutions? If so, click here to learn more and apply.QualificationsThe qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Computer Science (CS), Mathematics, Engineering, or a related field. Degrees in Information Technology, Information Systems, Information Security, Networking (Systems Administration), Information Assurance, or Cybersecurity may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and upper-level mathematics (for example, calculus, discrete mathematics). Relevant experience must be in one or more of the following: engineering hardware or software over their lifecycle (i.e., requirements analysis, design, development, implementation, testing, integration, deployment/installation, and maintenance), programming, vulnerability analysis, penetration testing, computer forensics, or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience or a Master's degree plus 4 years of relevant experience or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. EXPERT Entry is with a Bachelor's degree plus 9 years of relevant experience or a Master's degree plus 7 years of relevant experience or a Doctoral degree plus 5 years of relevant experience. An Associate's degree plus 11 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.CompetenciesWe're looking for someone with knowledge, skills, and experience in one or more of the following: - Programming in languages such as C, C++, and Java, especially in kernel development and device driver development, network/socket programming, and embedded systems development - Advanced malware analysis/reverse engineering skills for specialized malware/complex files. CISSP, CEH, GREM, GPEN certifications are a plus - Scripting languages (e.g., Python, Perl, or Ruby) - Assembly language(s) - Hardware design (e.g., FPGA, VHDL, Verilog, PCB) - Hardware Reverse Engineering - RF system design (e.g., DSP, SDR) - Embedded systems development - Software reverse engineering/interactive debugging tools (e.g., Ghidra, OllyDbg, gdb) - Hardware analysis tools (e.g., JTAG, Oscilloscopes) - Software vulnerability analysis and exploitation - Protocol and network analyzers (e.g., Wireshark, tcpdump) - Computer networking (e.g., communication protocols, routing and switching)

Computer Science Internship - Summer 2024 at SOFWERX at DefenseWERX

March 14, 2024 04:01 AM
Employer: SOFWERX at DefenseWERX Expires: 05/03/2024 Organization:  SOFWERX is a venue operated under an agreement between the United States Special Operations Command (USSOCOM) and DefenseWERX, designed to increase collaboration and innovation in order to solve the most difficult warfighter problems. SOFWERX is a forum for accelerating delivery of innovative capability, and facilitating capability refinement through exploration, experimentation, and assessment of promising technology. SOFWERX is in the heart of Ybor City, at a neutral, easily accessible facility.   Responsibilities:  Design, prototype, and test various software systems.Designs, builds, deploys, and maintains applications and infrastructure inside the AWS Cloud.Assist with conducting research on related technology focused topics − Consult and engage with subject matter experts  General Requirements:  MUST BE ELIGIBLE FOR A SECURITY CLEARANCEPursuing a Bachelor’s degree in Computer Science/Software Engineering Data Science or similarJunior or Senior level, with a current GPA of 3.0 or aboveStrong background in software developmentExperience with Java, Python, and Javascript programming languages is preferredExperience with linux based systemsExperience with different AWS services is desired.Knowledge in RESTful API architectureStrong troubleshooting skillsGood planning and organizational skillsWell-developed interpersonal and communication skillsMust be willing and able to work in a dynamic, rapidly changing environment.Must participate in weekly market research and submit minimum required entries for new capabilities, technologies, companies, organizations, etc. that could contribute to the innovative ideas needed to create solutions for the warfighter.  Time commitment:  − Hours of operation are 8:00am to 5:00pm Monday through Friday − This position requires a minimum of 15 hours and a maximum of 20 hours per week during the Fall/Spring semesters and up to 29 hours per week during the Spring semester − This internship is in-person with limited remote work opportunities     Opportunities:− Receive direct supervision from the Data Science Lead − Engage in employee events, such as team building − Build resume and explore career options − Apply skills and knowledge to the workplace − Upon completion of the internship, a letter of recommendation can be provided upon request − Opportunity for follow-on internship based on performance   Rate of Pay:  − $17.50/hour

Information System Security Professional

March 12, 2024 04:00 AM
ResponsibilitiesInformation System Security Professionals at NSA play a vital role in Security Architecture and Engineering, Communication and Network Security, Software Development Security, Security Operations, Identity and Access Management, Asset Security, and Security and Risk Management: - Defining information system security requirements and functionality - Designing system architectures, modeling, and network designs - Ability to implement systems engineering principles/methodology - Assessing the effectiveness of security solutions against present and projected threats - Producing formal and informal reports, briefings, and direct input to the customer regarding security and functionality of requirements, system architecture, application security, and security planning - Understanding concepts, principles, structure and standards used to design, implement, monitor and secure operating systems, equipment, networks, applications and controls to enforce levels of confidentiality, integrity and availability - Conducting security engineering/hardening of the latest operating systems, tailoring them for use in the specific mission area - Reviewing requests for security relevant changes on the mission infrastructures, ensuring risk is adequately mitigated - Understanding of cryptography, cloud technologies, and ability to program (Python, Java, etc.) - Knowledge of Systems Lifecycle Development, Threat Intelligence, and Incident Management - Ensuring appropriate operational security posture is maintained for a system or program; assessing compliance with the Federal Government's Risk Management Framework (RMF), as maintained by the National Institute of Standards and Technology (NIST) - Providing recommendations on Plan of Action & Milestones (POA&M) - Working with system owners to accredit/re-accredit critical mission systems Depending on their experience and preferences, Information System Security Professionals are hired into positions directly supporting a technical mission office or into the Cybersecurity Engineering Development Program (CSEDP). The development program is 3 years in length and combines formal training and diverse work assignments.Job SummaryAre you a cyber professional with the drive and expertise to be on the forefront of the cyber fight; tackling NSA's complex mission to defend against cyber threats of today and tomorrow? NSA, the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help secure our Nation's critical Infrastructure? If so, NSA is the place for you!QualificationsTHIS JOB OPENING ENCOMPASSES MULTIPLE POSITIONS. THE MINIMUM QUALIFICATIONS FOR EACH ARE BELOW: The qualifications listed are the minimum acceptable to be considered for the position. 1. INFORMATION SYSTEMS SECURITY DESIGNER: Degree must be in Computer Science or a related field (for example General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems). Relevant experience applying to all work levels: Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, or systems engineering. Network and system administration may account for some, but not all, of the experience. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development. In addition, may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network and system administration. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development. In addition, may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network and system administration. EXPERT Entry is with a Bachelor's degree plus 9 years of relevant experience, or a Master's degree plus 7 years of relevant experience, or a Doctoral degree plus 5 years of relevant experience. An Associate's degree plus 11 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development. In addition, may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, network and system administration. 2. INFORMATION SYSTEMS SECURITY ENGINEER: Degree must be in Computer Science or a related field (for example General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Security, and Information Systems). Relevant experience applying to all work levels: Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or updating information assurance documentation (for example System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices). Network and system administration may account for some, but not all, of the experience. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development and with information assurance and accreditation processes (e.g., System Security Plans, Risk Assessment Reports, Certification and Accreditation Packages, and System Requirements Traceability Matrices). In addition, experience may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and system administration. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development and with information assurance and accreditation processes (e.g., System Security Plans, Risk Assessment Reports, Certification and Accreditation Packages, and System Requirements Traceability Matrices). In addition, experience may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and system administration. EXPERT Entry is with a Bachelor's degree plus 9 years of relevant experience, or a Master's degree plus 7 years of relevant experience, or a Doctoral degree plus 5 years of relevant experience. An Associate's degree plus 11 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Relevant experience must be in one or more of the following areas: computer or information systems design/development and with information assurance and accreditation processes (e.g., System Security Plans, Risk Assessment Reports, Certification and Accreditation Packages, and System Requirements Traceability Matrices). In addition, experience may include programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and system administration. 3. INFORMATION SYSTEMS SECURITY OFFICER: Degree must be in Information Assurance, Information Security, Information Systems, Information Technology, Computer Networking, Information Science, Cybersecurity, or any related field. ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. A high school diploma or GED plus 4 years of relevant experience; or an Associate's degree or 18 semester hours of military coursework/training in a computer-related field plus 2 years of relevant experience may be considered. Experience must be in one or more of the following areas: information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, reverse engineering, systems engineering, or network and system administration. Relevant experience may also include experience with Risk Management Framework (RMF), Information Systems Security technologies, or IT policies. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience. A high school diploma or GED plus 7 years of relevant experience, or an Associate's degree or 18 semester hours of military coursework/training in a computer-related field plus 5 years of relevant experience may be considered. Experience must be in one or more of the following areas: Risk Management Framework (RMF), Information Systems Security technologies, or IT policies. Relevant experience may also include information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, reverse engineering, systems engineering, or network and system administration. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 year of relevant experience or a Doctoral degree plus 2 years of relevant experience. A high school diploma or GED plus 10 years of relevant experience, or an Associate's degree or 18 semester hours of military coursework/training in a computer-related field plus 8 years of relevant experience may be considered. Experience must be in one or more of the following areas: Risk Management Framework (RMF), Information Systems Security technologies, or IT policies. Relevant experience may also include information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetration testing, computer forensics, computer systems research, reverse engineering, systems engineering, or network and system administration. EXPERT Not applicable for Information Systems Security Officer.Competencies- Excellent problem-solving, communication and interpersonal skills - Is motivated - Works creatively and effectively in diverse environments - Can juggle multiple priorities and assignments - Applies standards, policies, procedures and requirements for ensuring information security - Possesses specialized skills that prevent, assess, and/or mitigate threats to information systems and infrastructures and the information contained in or transmitted by these systems. This may encompass: -- threat and vulnerability analysis -- risk mitigation -- incident response -- information assurance -- risk management framework -- configuration management -- monitor/define system security plans -- penetration testing -- preparing accreditation documentation

Network Cyber Mitigations Engineer/System Vulnerability Analyst

March 12, 2024 04:00 AM
ResponsibilitiesAre you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make an impact in cybersecurity and advance your career while enjoying the outstanding benefits of federal service? Network Cyber Mitigations Engineers and System Vulnerability Analysts at NSA have the opportunity to work in the following areas: - Wired and wireless network security - Vulnerability discovery and analysis - Scalable mitigations development - Perimeter/boundary defense - Collaboration platforms, such as VoIP and VTC systems - Mobile network security - Tailored security solutions - Reverse engineering - Researching emerging network industry technologies and solutions - Control system security - Malware analysis - Researching emerging network industry technologies and solutions - Ensuring adequacy of cybersecurity standards and configurations - Fusing vulnerability assessments from all sources into a unified picture of network riskJob SummaryNetwork Cyber Mitigations Engineers and System Vulnerability Analysts analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems. NSA analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Start your career as a Network Cyber Mitigations Engineer/System Vulnerability Analyst at NSA, where you can become an expert in networking protocols and architectures, cloud security, and Internet of Things protocols, to impact and advance traditional network security.QualificationsThe qualifications listed are the minimum acceptable to be considered for the position. Degree must be in Computer Science or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, or information assurance. Network and/or system administration may account for some, but not all, of the required experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience). ENTRY/DEVELOPMENTAL Entry is with a Bachelor's degree and no experience. An Associate's degree plus 2 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. FULL PERFORMANCE Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. SENIOR Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. EXPERT Entry is with a Bachelor's degree plus 9 years of relevant experience, or a Master's degree plus 7 years of relevant experience, or a Doctoral degree plus 5 years of relevant experience. An Associate's degree plus 11 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.CompetenciesWe're looking for entry and experienced professionals who possess strong problem solving, analytical, communication and interpersonal skills; and have knowledge or experience in the following areas: - Defending against and/or mitigating system vulnerabilities related to network infrastructure devices and boundary defense - Network device operating systems, functionality and configuration - Network architecture and protocols - Port, protocol and services analysis - Network segmentation - Network traffic analysis - Vulnerability detection, analysis and mitigations development - Reverse engineering - Fuzzing and penetration testing - Scripting languages, such as Python - Software defined networking - Cellular technology, including 5G - Authentication mechanisms