Cryptographic Vulnerability An

Contacte al anunciante
RESPONSIBILITIES Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you!Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by:- identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods- conducting security evaluations- developing countermeasures to address cryptographic vulnerabilities- designing, evaluating or modifying encryption schemes or algorithmThe ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can:- motivated - flexible- innovative- work effectively across in diverse environments- well-organized- handle multiple assignments SKILLS - Analyze problems to determine technical solutions.- Decide what procedures will be required to solve technical problems.- Evaluate technical proposals.- Identify new applications of known techniques.- Analyze data using mathematical/statistical methods.- Analyze new algorithms and protocols.- Evaluate solution designs.- Apply mathematical or computational methods and lines of reasoning.- Create and maintain documentation on technical information.- Document research processes, analyses and/or the results.- Write logical and accurate technical reports to communicate ideas across the enterprise.- Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms.- Conduct security evaluations of hardware or software components or architectures.- Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them.- Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services. PAY BENEFITS & WORK SCHEDULE Salary offers are based on candidates' education level and years of experience relevant to the position and also taking into account information provided by the hiring man
Categoría: Empleos ›
Subcategoría: Otros empleos ›
RESPONSIBILITIES Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you!Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by:- identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods- conducting security evaluations- developing countermeasures to address cryptographic vulnerabilities- designing, evaluating or modifying encryption schemes or algorithmThe ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can:- motivated - flexible- innovative- work effectively across in diverse environments- well-organized- handle multiple assignments SKILLS - Analyze problems to determine technical solutions.- Decide what procedures will be required to solve technical problems.- Evaluate technical proposals.- Identify new applications of known techniques.- Analyze data using mathematical/statistical methods.- Analyze new algorithms and protocols.- Evaluate solution designs.- Apply mathematical or computational methods and lines of reasoning.- Create and maintain documentation on technical information.- Document research processes, analyses and/or the results.- Write logical and accurate technical reports to communicate ideas across the enterprise.- Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms.- Conduct security evaluations of hardware or software components or architectures.- Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them.- Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services. PAY BENEFITS & WORK SCHEDULE Salary offers are based on candidates' education level and years of experience relevant to the position and also taking into account information provided by the hiring man
Categoría: Empleos ›
Subcategoría: Otros empleos ›
Contacte al anunciante