You are viewing a preview of this job. Log in or register to view more details about this job.

Cyber Mitigations Analyst/System Vulnerability Analyst - Entry to Expert Level (Multiple Locations - Maryland and Texas)

Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make an impact in cybersecurity and advance your career while enjoying the outstanding benefits of federal service?

Network cyber mitigations engineers and system vulnerability analysts at NSA analyze vulnerabilities and develop mitigations to strengthen defenses. They produce formal and informal reports, briefings, and guidance to defend against attacks against network infrastructure devices or systems.
Our analysts' competencies run the gamut of data transport possibilities. They work with traditional wired networks, wireless transport, including Wi-Fi and cellular, collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Start your career as a Network Cyber Mitigations Engineer/System Vulnerability Analyst at NSA, where you can become an expert in networking protocols and architectures, cloud security, and Internet of Things protocols, to impact and advance traditional network security.

Responsibilities

- Wired and wireless network security
- Vulnerability discovery and analysis
- Scalable mitigations development
- Perimeter/boundary defense
- Collaboration platforms, such as VVoIP and VTC systems
- Mobile network security
- Tailored security solutions
- Reverse engineering
- Researching emerging network industry technologies and solutions
- Control system security
- Malware analysis
- Researching emerging network industry technologies and solutions
- Ensuring adequacy of cybersecurity standards and configurations
- Fusing vulnerability assessments from all sources into a unified picture of network risk