My employer's incredible need for computer security experts continues unabated. Some new job-postings for you:

  • Formal Methods Researcher
  • Scientific Intellegence Analyst
  • Malicious Code Analysis Researcher

Descriptions under the fold, and the full list of open jobs can be found here:

https://www.ll.apply2jobs.com/ProfExt/index.cfm?fuseaction=mExternal.showSe archInterface

Just select Group 06-68 (Cyber Systems and Technology) from the 'Group' pull- down menu. And please notice that there are two screens of job postings.

  • Formal Methods Researcher
    State: Massachusetts
    City: Lexington
    Description: Group 68 - The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.

The selected candidate will work with or lead a team to research and develop formal methods for the design and specification of cyber systems and architectures. Tasks include leading prototyping and fielding of novel methods, analyzing current and proposed formal specification and verification techniques with respect to their application to DoD cyber systems, identifying gaps and weaknesses, and developing & evaluating performance metrics.

Requirements:
PhD in Computer Science with focus in formal methods. In lieu of a PhD, an MS with with 3-5 years of experience in formal methods research and application will considered. Strong mathematical background with significant project-based experience in at least one of the following is required: model checking, symbolic simulation, abstract interpretation, theorem proving, declarative methods, and type theory. Strong knowledge of the logical foundations of computer science and formal tools is obviously fundamental to all of these areas. An interest in the practicalities of applying these techniques is also necessary for this position, as the work will involve every aspect of deployment from design and implementation through testing and debugging. Must be able to propose and explore new analyses and derivative technologies and be able to implement and assess performance. Strong communication skills with sponsors and other research sites are essential.

Desired Skills:
Working knowledge of a systems programming language like C and of a scripting language like Python are both highly desirable, as is experience with computer security, system-level software, operating system internals, distributed systems, network protocols, or virtualization.

  • Scientific Intelligence Analyst
    State: Massachusetts
    City: Lexington
    Description: Group 68—Cyber Systems and Technology

The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.

Will work with a small team of technical experts to identify and research threats to US systems and infrastructure. Will research open source and classified reporting to gain big-picture as well as detailed technical understanding on relevant topics. Will perform efficient, high-quality research and will be committed to becoming a subject matter expert on assigned research topics. Will prepare summary reporting and deliver oral presentations to team members as well as Government officials.

Requirements:
MS in a technical field such as Electrical Engineering, Computer Engineering, Aerospace Engineering, Physics, or Computer Science. In lieu of an MS degree, a BS in the same fields with 3+ years of experience will be considered. Strong writing and oral communication skills with the ability to accurately acquire, summarize salient details, and report findings under time pressure. Strong knowledge and understanding of at least one of the following categories of US and foreign systems: Communication Infrastructure, Radars and Air Defense, Air Combat, UAVs, Space Systems, Mechanized Ground Combat, Naval Surface Warfare, Missile Defense, and Nuclear Capabilities.

Desired Skills and Qualifications:
In addition to a technical degree, a BA or BS in International Relations or Security Studies. Written foreign language proficiency in one or more of the following: Mandarin Chinese, Russian, Arabic or Persian. Military service or intelligence community background is highly desirable, with special preference given to career intelligence officers. Formal training, certification, and/or service academy coursework in intelligence analysis methods is beneficial. An active or recently inactive TS/SCI clearance with SSBI is also highly desirable.

Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.

  • Malicious Code Analysis Researcher
    State: Massachusetts
    City: Lexington
    Description: Group 68—Cyber Systems and Technology
    The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.

The selected candidate will participate in ongoing research into novel algorithms and techniques for understanding programs containing both intentional and unintentional malicious behaviors. Some of the work will involve designing and building systems to detect these behaviors, unassisted by an analyst. Other work will be in the area of building tools that enable deeper or faster human analysis. The tools involved will incorporate and extend existing static and dynamic analyses, so it will be necessary to be able to work with an established code base. However, the ideal candidate will propose and investigate new approaches when appropriate, where investigation includes everything from invention and design through implementation and testing. The ability to make progress independently is extremely valued, but much of the work will also require strong collaborative skills.

Requirements:
PhD in Computer Science, Computer Engineering or another related discipline with experience in software development. In lieu of a PhD, a MS and 3 years of directly related experience will be considered. Extensive previous experience with at least one of the following is required: static analysis, dynamic analysis, compiler internals, systems programming, malware analysis, or x86 assembly. Strong programming skills in C as well as a mainstream scripting language such as Python or Perl are additionally required.

Willingness to apply for or possession of an elevated clearance is desired.