This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs in Texas today!

To post a job, login or create an account |  Post a Job

  Jobs in Texas  

Bringing the best, highest paying job offers near you

previous arrow
next arrow

National Security Agency: Computer System Security Manager – Immediate Hiring (West Point)

National Security Agency

This is a Full-time position in West Point, TX posted March 26, 2021.

ResponsibilitiesThe professionals at the National Security Agency (NSA) have one common goal: to protect our nation.

The mission requires a strong offense and a steadfast defense.

The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes.

The defense prevents adversaries from gaining access to sensitive classified national security information.The need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA’s mission.

The increased complexity of supporting NSA’s mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems.Description of PositionComputer Systems Security Managers at the NSA play a vital role in maintaining the confidentiality, availability, and integrity of the Agency computing infrastructure.

As a Computer Systems Security Manager, at the NSA, your responsibilities may include:* Supporting a program, organization, system, or enclave* Reviewing investigative processing of security incidents* Developing or interpreting computer security policies* Overseeing, evaluating and supporting the security authorization process* Providing leadership, management and direction of cybersecurity activities* Advising senior leadership (e.G., Chief Information Security Officer [CISO], Authorizing Official [AO]) on risk levels, and changes affecting the organization’s cybersecurity posture* Advising senior leadership or of information security programs, policies, processes, systems, and mission elementsJob SummaryNSA is in search of Computer Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information.

We are looking for you to apply your computer science expertise to projects that seek to create new standards for the transformation of information.

If you want to develop technologies and tools and be a part of cutting edge innovations; join our team of experts!

Help protect national security interests as part of the world’s most advanced team of computer science professionals!Qualifications*The qualifications listed are the minimum acceptable to be considered for the position.

Salary offers are based on candidates’ education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.Entry is with a Bachelor’s degree plus 6 years of relevant experience or a Master’s degree plus 4 years of relevant experience or a Doctoral degree plus 2 years of relevant experience.

An Associate’s degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.Degree must be in Computer Science (CS) or related field (e.G., Computer Engineering, Software Engineering, Systems Engineering, Mathematics, Physics, Electrical Engineering, Mechanical Engineering, Computer Security, Computer Forensics, Network Engineering).

Degrees in Information Technology, Information Systems, Information Security, Networking (Systems Administration), and Information Assurance may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and upper-level mathematics (for example, calculus, discrete mathematics).Relevant experience must be in the design/development of computer or information systems and include engineering hardware and/or software over their lifecycle (i.E., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance), programming, computer systems research, reverse engineering, and/or computer/network security.

Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.E., 24-week JCAC course will count as 6 months of experience).

Information Assurance Certifications (e.G., NET+, Security+, Certified Information System Security Professional (CISSP), and Certification Accreditation Professional (CAP)) are preferred.CompetenciesThe ideal candidate is someone with a desire for experiential learning and strong problem-solving, analytic and interpersonal skills who is:* Able to work effectively across several different functional areas in a collaborative environment* Able to communicate effectively (both orally and written)* Well-organized and able to handle multiple assignments* Willing to take the initiative* Willing to be innovative to achieve successKnowledge and experience in one or more of the following is desired:* Applying confidentiality, integrity, and availability principles* Computer networking operations, concepts and protocols* Creating policies that reflect system security objectives* Cybersecurity and privacy laws, regulations, policies, and ethics* Cyber threat and vulnerability mitigation* Incident response* Information assurance best practices* Risk management processes (e.G., methods for assessing and mitigating risk)* Network protocols (especially TCP/IP, VOIP, wireless protocols)* Network security methodologies* Vulnerability scanning and analysisAssociated topics: asic, digital, engg, engineer ii, hardware designer, hardware engineer, ic, layout, pcb, plc

Please add your adsense or publicity code here (inc/structure/adsfooter.php)