Cryptologic Computer Scientist 4

Annapolis Junction, MD, USA

Apply now Apply later

Job Description:

We are looking for a Cryptologic Computer Scientist with expertise in Red Hat Enterprise Linux (RHEL) system administration and Ansible automation. You will configure and maintain virtual machines (VMs) for malware analysis, ensuring they are optimized for security and performance. Additionally, you will develop and implement System Security Plans (SSPs) to maintain compliance and protect sensitive information. Your role will be crucial in supporting cryptologic operations through effective system administration and automation.

The Level 4 Cryptologic Computer Scientist shall possess the following capabilities:

Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target systems, knowledge discovery of passive and active systems, or other cryptologic computer science mission support. Requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computer architecture, discrete math, programming language theory, and data structures are applied to each problem to provide state-of-the-art techniques, tools, and approaches.

Qualifications:

  • Doctoral degree plus 7 years of relevant experience
  • Master's degree with 9 years of relevant experience
  • Bachelor's Degree with 11 years of relevant experience
  • Associates degree with 13 years of relevant experience 
  • Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field with at least one programming and at least 4 upper-level math classes (Calculus and above)  
  • Relevant experience must be in a computer science area (i.e. theoretical or applied), simulation/model development, designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g. algorithm or development) computation science, algorithm analysis and design, reverse engineering, and/or designing/developing computer and information systems, including engineering hardware and/or software.

Must Have TS/SCI With Full Scope Poly.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: Ansible Automation Compliance Computer Science Forensics Linux Malware Mathematics Red Hat Reverse engineering System Security Plan TS/SCI

Regions: Asia/Pacific North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.