Cryptographic Vulnerability Analyst with Security Clearance
Apply NowCompany: ManTech International
Location: Linthicum Heights, MD 21090
Description:
ManTech is seeking a motivated, career and customer-oriented Cryptographic Vulnerability Analyst to join our team in the Linthicum location and will be part of a team that provides Cybersecurity Analysis and Cryptographic Engineering technical expertise. Responsibilities include, but are not limited to: * Identify vulnerabilities and cybersecurity threats to program, functions, products, applications and systems
* Leverage HUMINT, SIGINT, GEOINT, OSINT, and other information to assess vulnerabilities and conduct security evaluation of hardware and software components, architectures, algorithms and protocols
* Analyze and characterize identified vulnerabilities and threats
* Relate identified vulnerabilities and threats and the effects on the operations and missions supported by those systems
* Compare and contrast various cryptographic attack techniques and developing operationally effective countermeasures
* Provide formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems, technologies, applications, operations, or missions being studied
* Collaborate with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
* Use threat analysis and technical knowledge to provide security guidance and develop mitigations to threats and vulnerabilities
* Team with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
* Create and maintain documentation on technical information and document research processes, analyses and/or the results
* Write logical and accurate technical reports to communicate ideas across the enterprise
* Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services
* Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them
* Analyze data using mathematical/statistical methods
* Analyze problems to determine technical solutions
* Apply mathematical or computational methods and lines of reasoning
* Evaluate technical proposals and solution designs
* Identify new applications of known techniques
* Identify vulnerabilities to attack communications networks and systems and developing countermeasures
* Perform security analysis, evaluation and guidance on the design and implementation of cryptographic and communication protocols
* Apply concepts and principles of computer security and vulnerability analysis
* Work individually or as part of a team and may serve as a team lead Basic Qualifications: * Bachelor's degree in Computer Science, Engineering, or Computer Engineering and 3 years of experience * Or a Master's degree in computer science, Engineering, or Computer Engineering and 1 year of experience
* In lieu of a degree, a total of 8 years of relevant experience Security Clearance Requirements: * Must have a current/active TS/SCI with polygraph Physical Requirements: * Must be able to remain in a stationary position 50%.
* Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
* The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations.
* Leverage HUMINT, SIGINT, GEOINT, OSINT, and other information to assess vulnerabilities and conduct security evaluation of hardware and software components, architectures, algorithms and protocols
* Analyze and characterize identified vulnerabilities and threats
* Relate identified vulnerabilities and threats and the effects on the operations and missions supported by those systems
* Compare and contrast various cryptographic attack techniques and developing operationally effective countermeasures
* Provide formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems, technologies, applications, operations, or missions being studied
* Collaborate with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
* Use threat analysis and technical knowledge to provide security guidance and develop mitigations to threats and vulnerabilities
* Team with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
* Create and maintain documentation on technical information and document research processes, analyses and/or the results
* Write logical and accurate technical reports to communicate ideas across the enterprise
* Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services
* Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them
* Analyze data using mathematical/statistical methods
* Analyze problems to determine technical solutions
* Apply mathematical or computational methods and lines of reasoning
* Evaluate technical proposals and solution designs
* Identify new applications of known techniques
* Identify vulnerabilities to attack communications networks and systems and developing countermeasures
* Perform security analysis, evaluation and guidance on the design and implementation of cryptographic and communication protocols
* Apply concepts and principles of computer security and vulnerability analysis
* Work individually or as part of a team and may serve as a team lead Basic Qualifications: * Bachelor's degree in Computer Science, Engineering, or Computer Engineering and 3 years of experience * Or a Master's degree in computer science, Engineering, or Computer Engineering and 1 year of experience
* In lieu of a degree, a total of 8 years of relevant experience Security Clearance Requirements: * Must have a current/active TS/SCI with polygraph Physical Requirements: * Must be able to remain in a stationary position 50%.
* Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
* The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations.