Oregon State University

School of Electrical Engineering and Computer Science

School of Electrical Engineering and Computer Science
 

Connect with Us

  • For Students looking for Jobs
  • For Alumni to stay connected
  • For Employers needing to hire

Don't wait! First round interviews are being scheduled now.

Employment Type:
Full time
Posted:
5/19/2011
Job Category:
Information Services
Industry:
Government
Compensation:
$42,209 - $97,333
Info Assurance/Security Professionals (1018675)
(This job is no longer available)
National Security Agency | Fort George G. Meade, MD
loading
loading
School
Major
Grad Date
 
 

Not sure what types of jobs you are interested in?


Explore Jobs
Based on Your Education

Follow This Company
Share

Job Description

Information Assurance/Security Professionals

The NSA Information Assurance Directorate (IAD) is a dynamic and fast paced organization with the leading role for Information Assurance guidance for protecting National Security Information and Information Systems, in accordance with National Security Directive 42. We provide real-time, hands-on support for the design, development, implementation, testing and maintenance of secure communications equipment, systems, networks, enterprise architectures, and infrastructures. Information Assurance utilizes cutting edge security solutions at all levels (from individual component to overarching enterprise architecture) for the detection and mitigation of vulnerabilities and the threats against them.

1. Information System Security Engineer (ISSE): Define information system security requirements and functionality by designing system architecture, developing and implementing security designs, and assessing the effectiveness of security solutions against present and projected threats. Implement solutions by planning, training, and installing/configuring. Produce formal and informal reports, briefings, and direct input to the customer regarding security and functionality requirements, system architecture, and security designs. Conduct risk assessments throughout the life-cycle as well as continuously monitoring security relevant changes of the IT system.

2. Information System Security Designer (ISSD): Advise customers in defining information system security requirements and functionality by designing system architecture, developing security designs, and assessing the effectiveness of security solutions against present and projected threats. Advise customers on implementing solutions by planning, training, and installing/configuring. Produce formal and informal reports, briefings, and direct input to the customer regarding security and functionality requirements, system architecture, and security designs.

3. Global Network Exploitation and Vulnerability Analyst (GNEVA) ' Protect computer network systems by identifying vulnerabilities and potentials for attacks. Discover methods of protecting global networks, computer systems, or specific hardware or software. Design, demonstrate, develop, implement, or update protection methods and recommend mitigation strategies and techniques.

4. Software Engineer: Analyze, design, verify, validate, implement, apply and maintain software systems. Appropriately apply discrete mathematics, probability and statistics, and other relevant topics in computer science and supporting disciplines to complex software systems. Generalize techniques, as appropriate, to apply to multiple domains. Develop and provide appropriate documentation and training.

5. Hardware/Software Design Engineer: Design, develop, construct and test electronic hardware and software processing components. These components are typically subsystems of communication, collection, processing or analysis systems.

6. Technology Vulnerability Analysts: Identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms. Characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and missions supported by those systems. Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures. Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied.

7. Technical Writers: Write, edit, review and prepare for publication or presentation scientific and/or technical documents on engineering-designed systems and equipment or information technology research, applying knowledge of the technical subject matter of the specific position. Prepare detailed test plans, procedures and reports dealing with all levels of security products, systems, networks and architectures.

Qualifications

IAD is looking for energetic, forward thinking information security professionals at all career levels for the following positions: Information System Security Engineer, Information System Security Designer, Software Engineer, Programmer, Global Network Exploitation and Vulnerability Analyst, Technology Vulnerability Analyst, and Technical Writer.

If you are an Information Assurance professional, have a degree in engineering , computer science, information assurance or networking, or have certifications to include CISSP, NET+, Security+ or other relevant experience then you may be qualified to work in the highly technical IAD organization.

Pay, Benefits, & Work Schedule

Salary is commensurate with education and experience.

Salary range: $42,209 - $97,333

About National Security Agency

The National Security Agency (NSA) is a world leader in Signals Intelligence. We carry out some of the nation’s most important and sensitive intelligence activities to secure information superiority for America and its allies. 

We have two primary missions. Our Information Assurance mission is the defense: it protects U.S. information by preventing foreign adversaries from gaining access to our information systems. Our Signals Intelligence mission is the offense: collecting foreign signals and producing intelligence to give U.S. policy makers and warfighters the decision advantage. NSA also enables network warfare operations to defeat terrorists and their organizations at home and abroad, consistent with U.S. laws and the protection of privacy and civil liberties.

At the nation’s top cryptologic organization, we employ the best and the brightest, who use their intelligence to solve some of the nation’s most difficult challenges. We are also the largest employer of mathematicians in the country, as well as one of the most important centers of foreign language analysis and research.