My employer's incredible need for computer security experts continues unabated. Some new job-postings for you:
- Formal Methods Researcher
- Scientific Intellegence Analyst
- Malicious Code Analysis Researcher
Descriptions under the fold, and the full list of open jobs can be found here:
https://www.ll.apply2jobs.com/ProfExt/index.cfm?fuseaction=mExternal.showSe archInterface
Just select Group 06-68 (Cyber Systems and Technology) from the 'Group' pull- down menu. And please notice that there are two screens of job postings.
- Formal Methods Researcher
State: Massachusetts
City: Lexington
Description: Group 68 - The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.
The selected candidate will work with or lead a team to research and develop formal methods for the design and specification of cyber systems and architectures. Tasks include leading prototyping and fielding of novel methods, analyzing current and proposed formal specification and verification techniques with respect to their application to DoD cyber systems, identifying gaps and weaknesses, and developing & evaluating performance metrics.
Requirements:
PhD in Computer Science with focus in formal methods. In lieu of a PhD, an MS
with with 3-5 years of experience in formal methods research and application
will considered. Strong mathematical background with significant project-based
experience in at least one of the following is required: model checking,
symbolic simulation, abstract interpretation, theorem proving, declarative
methods, and type theory. Strong knowledge of the logical foundations of
computer science and formal tools is obviously fundamental to all of these
areas. An interest in the practicalities of applying these techniques is also
necessary for this position, as the work will involve every aspect of
deployment from design and implementation through testing and debugging. Must
be able to propose and explore new analyses and derivative technologies and be
able to implement and assess performance. Strong communication skills with
sponsors and other research sites are essential.
Desired Skills:
Working knowledge of a systems programming language like C and of a scripting
language like Python are both highly desirable, as is experience with computer
security, system-level software, operating system internals, distributed
systems, network protocols, or virtualization.
- Scientific Intelligence Analyst
State: Massachusetts
City: Lexington
Description: Group 68—Cyber Systems and Technology
The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.
Will work with a small team of technical experts to identify and research threats to US systems and infrastructure. Will research open source and classified reporting to gain big-picture as well as detailed technical understanding on relevant topics. Will perform efficient, high-quality research and will be committed to becoming a subject matter expert on assigned research topics. Will prepare summary reporting and deliver oral presentations to team members as well as Government officials.
Requirements:
MS in a technical field such as Electrical Engineering, Computer Engineering,
Aerospace Engineering, Physics, or Computer Science. In lieu of an MS degree,
a BS in the same fields with 3+ years of experience will be considered. Strong
writing and oral communication skills with the ability to accurately acquire,
summarize salient details, and report findings under time pressure. Strong
knowledge and understanding of at least one of the following categories of US
and foreign systems: Communication Infrastructure, Radars and Air Defense, Air
Combat, UAVs, Space Systems, Mechanized Ground Combat, Naval Surface Warfare,
Missile Defense, and Nuclear Capabilities.
Desired Skills and Qualifications:
In addition to a technical degree, a BA or BS in International Relations or
Security Studies. Written foreign language proficiency in one or more of the
following: Mandarin Chinese, Russian, Arabic or Persian. Military service or
intelligence community background is highly desirable, with special preference
given to career intelligence officers. Formal training, certification, and/or
service academy coursework in intelligence analysis methods is beneficial. An
active or recently inactive TS/SCI clearance with SSBI is also highly
desirable.
Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
- Malicious Code Analysis Researcher
State: Massachusetts
City: Lexington
Description: Group 68—Cyber Systems and Technology
The Cyber Systems and Technology Group's R&D efforts focus on techniques for protecting from, and detecting and reacting to, intrusions into networked information systems, and for preventing software faults and understanding malicious code that exploits those faults. The group is involved in testing and evaluating the security of U.S. Government systems and networks and in identifying and demonstrating vulnerabilities in such systems. In each of the group's R&D areas, emphasis is placed on realistic data and experimental evaluation of techniques in test beds.
The selected candidate will participate in ongoing research into novel algorithms and techniques for understanding programs containing both intentional and unintentional malicious behaviors. Some of the work will involve designing and building systems to detect these behaviors, unassisted by an analyst. Other work will be in the area of building tools that enable deeper or faster human analysis. The tools involved will incorporate and extend existing static and dynamic analyses, so it will be necessary to be able to work with an established code base. However, the ideal candidate will propose and investigate new approaches when appropriate, where investigation includes everything from invention and design through implementation and testing. The ability to make progress independently is extremely valued, but much of the work will also require strong collaborative skills.
Requirements:
PhD in Computer Science, Computer Engineering or another related discipline
with experience in software development. In lieu of a PhD, a MS and 3 years of
directly related experience will be considered. Extensive previous experience
with at least one of the following is required: static analysis, dynamic
analysis, compiler internals, systems programming, malware analysis, or x86
assembly. Strong programming skills in C as well as a mainstream scripting
language such as Python or Perl are additionally required.
Willingness to apply for or possession of an elevated clearance is desired.