Cryptographic Vulnerability An
Contacte al anunciante
RESPONSIBILITIES Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you!Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by:- identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods- conducting security evaluations- developing countermeasures to address cryptographic vulnerabilities- designing, evaluating or modifying encryption schemes or algorithmThe ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can:- motivated - flexible- innovative- work effectively across in diverse environments- well-organized- handle multiple assignments SKILLS - Analyze problems to determine technical solutions.- Decide what procedures will be required to solve technical problems.- Evaluate technical proposals.- Identify new applications of known techniques.- Analyze data using mathematical/statistical methods.- Analyze new algorithms and protocols.- Evaluate solution designs.- Apply mathematical or computational methods and lines of reasoning.- Create and maintain documentation on technical information.- Document research processes, analyses and/or the results.- Write logical and accurate technical reports to communicate ideas across the enterprise.- Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms.- Conduct security evaluations of hardware or software components or architectures.- Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them.- Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services. PAY BENEFITS & WORK SCHEDULE Salary offers are based on candidates' education level and years of experience relevant to the position and also taking into account information provided by the hiring man
Area: Baltimore ›
Categoría: Empleos ›
Subcategoría: Otros empleos ›
Categorías Populares
RESPONSIBILITIES Do you want to build Cyber capabilities and capacity to enable national security operations? Do you want to be at the forefront of Cyber defense, tackling a complex mission to protect against the threats of today and tomorrow? If so, NSA is the place for you!Cryptographic Vulnerability Analysts play a critical role in enabling security solutions by:- identifying vulnerabilities of and attacks to cryptographic systems - comparing and contrasting various cryptographic attack techniques - producing formal and informal reports, briefings and perspectives - analyzing data using mathematical/statistical methods- conducting security evaluations- developing countermeasures to address cryptographic vulnerabilities- designing, evaluating or modifying encryption schemes or algorithmThe ideal candidate is someone with strong problem-solving, analytic, communication and interpersonal skills who is/can:- motivated - flexible- innovative- work effectively across in diverse environments- well-organized- handle multiple assignments SKILLS - Analyze problems to determine technical solutions.- Decide what procedures will be required to solve technical problems.- Evaluate technical proposals.- Identify new applications of known techniques.- Analyze data using mathematical/statistical methods.- Analyze new algorithms and protocols.- Evaluate solution designs.- Apply mathematical or computational methods and lines of reasoning.- Create and maintain documentation on technical information.- Document research processes, analyses and/or the results.- Write logical and accurate technical reports to communicate ideas across the enterprise.- Ensure secure transmission by designing, evaluating, or modifying encryption schemes or algorithms.- Conduct security evaluations of hardware or software components or architectures.- Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them.- Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services. PAY BENEFITS & WORK SCHEDULE Salary offers are based on candidates' education level and years of experience relevant to the position and also taking into account information provided by the hiring man
Area: Baltimore ›
Categoría: Empleos ›
Subcategoría: Otros empleos ›
Contacte al anunciante
Anuncios similares
Director of Innovation and Imp
The Arc Central Chesapeake Region is partnering with Dragonfly Central to recruit the next Director of Innovation and Improvement. This is
Contracting Specialist - Entry
RESPONSIBILITIES Contracting specialists at NSA acquire commercial goods and services that allow the agency to collect foreign intelligence
Catalog and Metadata Librarian
AOK Library at the University of Maryland, Baltimore County, seeks an innovative and collaborative individual to join the Bibliographic and
Computer Network Defense Analy
RESPONSIBILITIES Computer Network Defense Analysts work in multiple organizations at NSA and are primarily responsible for finding vulnerab
Anuncios similares
Director of Innovation and Imp
The Arc Central Chesapeake Region is partnering with Dragonfly Central to recruit the next Director of Innovation and Improvement. This is
Contracting Specialist - Entry
RESPONSIBILITIES Contracting specialists at NSA acquire commercial goods and services that allow the agency to collect foreign intelligence
Catalog and Metadata Librarian
AOK Library at the University of Maryland, Baltimore County, seeks an innovative and collaborative individual to join the Bibliographic and
Computer Network Defense Analy
RESPONSIBILITIES Computer Network Defense Analysts work in multiple organizations at NSA and are primarily responsible for finding vulnerab
Categorías Populares