NSA/CSS Threat Operations Center (NTOC) Analyst Internet & Ecommerce - Honolulu, HI at Geebo

NSA/CSS Threat Operations Center (NTOC) Analyst

Company Name:
National Security Agency
Responsibilities

The NSA/CSS Threat Operations Center (NTOC) is the focal point for mission discovery of cyber threats, characterization and attribution of those threats, creation and sharing of situational awareness, and the development of mitigation strategies. The mission, with operations running continually around the clock, enables us to defeat adversaries' efforts to exploit and attack our networks. NTOC is looking for talented people to execute the NTOC mission. These positions are idea for individuals interested in working the fast-paced and exciting world of cyber operations.
Individuals selected for positions in NTOC will work closely with the customers and other NTOC personnel to fulfill their mission requirements and perform in-depth analysis using cutting edge technology and techniques.
NTOC Hawaii is searching to fill the following positions:
Global Network Exploitation and Vulnerability Analyst (GNEVA): Protect computer network systems by identifying vulnerabilities and potentials for attacks. Discover methods of protecting global networks, computer systems, or specific hardware or software. Design, demonstrate, develop, implement or update protection methods and recommend mitigation strategies and techniques.
Threat Analyst: Perform research of adversarial threats posed to various systems, technologies, operations, or missions in all appropriate intelligence sources. Analyze collected data to derive facts, inferences, and projections concerning capabilities, intentions, attack approaches, and likelihood of various adversarial attacks under various situations. Research resource allocations, motivations, tendencies, personalities, and tolerance for detection, attribution and retribution that influence adversarial decisions. Contribute to profiling adversarial behavior with respect to identified system attacks in an operational mission context. Produce formal and informal reports, briefings, and perspectives of the behavior of adversaries against target systems, technologies, operations, and missions.
Computer Network Defense (CND) Analyst: Uses information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
.
Qualifications

Global Network Exploitation and Vulnerability Analyst (GNEVA): Bachelor's degree in Computer Science or related area (e.g., Engineering, Mathematics). Upper level coursework or work experience should include some of the following: Automata Theory and Formal Languages; Computer Forensics; Computer Network Architecture and Protocols; Network Security; Programming Languages Theory; Software Engineering; System Architecture and Design; Systems Design and Programming; Programming
Threat Analyst: Associate's Degree in behavioral science, political science, or international relations or related field required, Bachelor's Degree preferred. Experience performing technical threat analysis, multi-source analysis, or intelligence analysis preferred. Experience performing analysis in a military or intelligence community organization is highly desirable.
Computer Network Defense (CND) Analyst: Bachelor's Degree in Computer Science or related field, such as: General Engineering, Computer Engineering, Electrical Engineering, Mathematics, Computer Forensics, Cyber Security, IT, Information Assurance, or Information Systems. Experience in network and system administration, IT support, infrastructure support, programming, vulnerability analysis, penetration testing, computer forensics, cyber security, intelligence, information assurance, or related experience.
.
Pay, Benefits, & Work Schedule

This is a full-time position. Shift work on a compressed work schedule may be required.
Salary is commensurate with experience and education.
Salary: $39,985-$92,204
.
How To Apply - External

To apply for this position, please click the 'Apply Now' button located at the top or bottom of this page. After completing the application and clicking the 'Submit Final' button, you will receive a confirmation email. Emails regarding your application status will be sent periodically. Please ensure your spam filters are configured to accept emails from .
PLEASE NOTE:
U.S. Citizenship is required for all applicants. Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.
This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you must submit documents verifying your eligibility with your application package.
.
DCIPS Disclaimer

The National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.
.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.