Careers

At CERT, we study and solve problems with widespread cybersecurity implications, research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to help improve cybersecurity.

We develop tools, products, and methods to help organizations conduct forensic examinations, analyze  vulnerabilities, and monitor large-scale networks. We help organizations determine how effective their security-related practices are. And we share our work at conferences; in blogs, webinars, and podcasts; and through our many articles, technical reports, and white papers.

Our work environment is collaborative in nature as staff members work on cross-functional teams within the CERT Division, the Software Engineering Institute, other Carnegie Mellon departments, and across the global community. We also collaborate with high-level organizations, such as the U.S. Department of Defense and the Department of Homeland Security; law enforcement including the FBI; the intelligence community; and many industry organizations.

Staff members say that one of the most satisfying aspects of working in the CERT Division "is being able to contribute to a global community that can impact the state of internet security."

Current Job Openings

Your top-notch skills and knowledge can help us make a difference in our nation's cybersecurity. To learn more about working at CERT, see Our Place at Carnegie Mellon University and Living in Pittsburgh.

 

The position you are looking for is not available. Please take a look at our current open positions listed below.

Select Job Location

Sort by Date Posted Title Location

17 Oct
2017
Cyber Security Modeling and Simulation Capability Developer - 2007183
Pittsburgh, PA

This opportunity is available in our Pittsburgh, PA or Arlington, VA offices.

What We Do: The CERT Cyber Workforce Development (CWD) team aims to lower the cost and time required to build cybersecurity expertise and to amplify that expertise to a globally distributed workforce. To achieve this, we develop and integrate innovative tools and processes to train, exercise, and assess cybersecurity professionals and teams. In doing so, CWD pioneers research and development efforts designed to counter cybersecurity threats to our nation.

CWD develops solutions for improving an organization’s cyber workforce development program. CWD partners with sponsors to identify and resolve gaps that hinder a workforce’s ability to counter rapidly evolving adversary tactics in cyberspace. We achieve this by guiding organizations through improvement of their cyber workforce’s knowledge, skills, and abilities.

CWD’s core strength is our supportive and highly collaborative culture. Our team recognizes the importance of our mission: to ensure that our nation’s cybersecurity workforce is the best in the world. We are looking for people of character who share our passion, love technology and teamwork, and who have a desire to teach, learn from, and collaborate with others. We provide numerous internal and external training and professional development opportunities for members of our team. We also learn from each other through cross-training and mentoring.

Position Summary: As a member of CWD, you will work with other team members to develop and deliver cybersecurity training capabilities and programs -- primarily for US military/government sponsors.

Requirements:

  • BS in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience; MS in the same fields with five (5) years of experience or equivalent combination of training or experience
  • Willingness to travel to various locations in support of the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (15%)
  • You will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance

Duties:

In CWD, we certainly do not expect you to know or have experience with everything; however, our wish-list includes the following.

  • Interacting directly with sponsors, gathering requirements and objectives, producing and facilitating creative and engaging scenario exercises, and building physical and virtualized network systems to support training programs
  • Defining, creating, and maintaining solutions in support of DoD’s cyberspace responsibilities
  • Working regularly with a wide range of software and hardware technologies
  • Developing and instructing cybersecurity training content to sponsors
  • Developing software and hardware proofs of concept and prototypes
  • Leading and supervising direct reports as well as secondary reports; providing performance management, career guidance, and corrective actions as required

Knowledge, Skills and Abilities:

  • Excellent oral and written communications
  • Server and desktop platforms (e.g. Windows, Linux)
  • Network administration (e.g. Routers, Switches, Firewalls, Proxies, etc.)
  • Programming (e.g. C, C++, C#, Python, Java, etc.)
  • Frameworks (e.g. Angular.js, Node.js, Django, RESTful API, .NET, etc.)
  • Version Control Systems (e.g. Git, Bitbucket, etc.)
  • Scripting (e.g. Bash, PowerShell, etc.)
  • Configuration management and deployment automation (e.g. Ansible, Puppet, Chef, Packer, etc.)
  • Virtualization and cloud technologies (e.g. VMWare ESX server, Linux KVM/QEMU, Xen, OpenNebulla, Microsoft Azure, Amazon AWS, etc.)
  • Commercial and open source security tools (e.g. McAfee ePO/HIPS, ArcSight, Splunk, Security Onion, ELK stack, etc.)
  • Penetration testing (Kali, Metasploit, Powershell Empire, etc.)
  • Data science (R query design, Elastic Stack, Bro, Hadoop, etc)
  • Learning analytics (curriculum design, knowledge and performance assessment, feedback, remediation, etc.)
  • Multitasking and working effectively with multiple project teams and sponsors
  • Technical problem-solving, analytical and information organization
  • Network system design and troubleshooting

Desired Experience:

  • US military service in positions involving information technology, cybersecurity, and management of large-scale government networks
  • Team leadership positions within cybersecurity and/or IT-focused organizations
  • Demonstrated software engineering and development experience
  • Demonstrated practical experience with commercial and open-source cyber security tools
  • Teaching experience

Job Function Breakdown:

10% Design and develop technical documents and instructional materials.

5% Research, evaluate, develop, install/configure hardware and software cyber security solutions.

30% Develop software solutions to training challenges.

40% Mentor, guide and interact with team and other staff.

15% Contribute to transition planning and strategy.

TOTAL=100%

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

12 Oct
2017
Scholarship for Service (SFS) Internship Opportunities 2017
Pittsburgh, PA

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. We work closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

The SEI participates in the OPM CyberCorps Scholarship for Service (SFS) program. Are you passionate about contributing to leading edge projects that make a difference in our world? Do you want to expand your education beyond the classroom, and earn money while doing it? Come to work with us!

Our interns are valued team members, and do real work related to cyber security, emerging technologies, and software solutions.

SFS internship opportunities may be available in the following areas:

  • Software Development
  • Cybersecurity research, including: vulnerability assessment, insider threat research, penetration testing, risk management, incident response, digital forensics, network defense, and malware analysis.
  • Machine Learning, Data Science, and Statistics
  • Artificial Intelligence
  • Systems Engineering
  • Mobile Computing
  • Secure Coding

Requirements:

  • SFS student with current enrollment in a relevant BS or MS degree program: Computer Science, Computer Engineering, Information Security/Assurance, Mathematics, Statistics, or related discipline.
  • You will be subject to a background check and must be able to work in the United States without visa sponsorship.

Check for our positions on Handshake!

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

09 Oct
2017
SEI Spring Internship Opportunities 2017
Pittsburgh, PA

We are hiring for Spring Interns, part-time, 20 hours per week. If you are a student looking to expand your education beyond what you can learn in school, and earn money doing it, we want you to come work with us! You’ll have an opportunity to work on cutting-edge projects while adding experience to your resume. Our interns do real work: writing code, analyzing data, and collaborating as valuable team members.

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

Internship opportunities may be available in the following areas:

  • Programming
  • Cybersecurity Research
  • Design / Communication
  • Software Design/Development
  • Project Management
  • Computer Engineering
  • Help Desk Support
  • Computer Science
  • Information Systems
  • Management Information Systems
  • Mathematics
  • Statistics
  • Systems Engineering
  • Malware Analysis

Requirements:

  • You must be currently enrolled in a degree granting program.
  • You will be subject to a background check and must be eligible to work in the United States without Visa sponsorship.

Check for our positions on Handshake!

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

09 Oct
2017
SEI Summer Internship Opportunities 2018
Pittsburgh, PA

We are looking for Summer Interns, full-tim, 40 hours/week. If you are a student looking to expand your education beyond what you can learn in school, and earn money doing it, we want you to come work with us! You’ll have an opportunity to work on cutting-edge projects while adding experience to your resume. Our interns do real work: writing code, analyzing data, and collaborating as valuable team members.

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

Internship opportunities may be available in the following areas:

  • Programming
  • Cybersecurity Research
  • Design / Communication
  • Software Design/Development
  • Project Management
  • Computer Engineering
  • Help Desk Support
  • Computer Science
  • Information Systems
  • Management Information Systems
  • Mathematics
  • Statistics
  • Systems Engineering
  • Malware Analysis

Requirements:

  • You must be currently enrolled in a degree granting program.
  • You will be subject to a background check and must be eligible to work in the United States without Visa sponsorship.

Check for our positions on Handshake!

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

03 Oct
2017
Senior Software Assurance Engineer - 2007077
Operating Location Boston - Bedford, MA

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position to help improve cybersecurity of the NC3 Weapons System (Nuclear Command, Control and Communication). We expect the position to be highly visible and deeply impactful to assist senior leaders of the Air Force program to increase the cyber resiliency of NC3 throughout the lifecycle spanning from the requirements, development, deployment and sustainment.

Requirements:

  • Bachelor's degree or equivalent degree in a relevant discipline with ten (10) years applicable experience; MS or equivalent degree in a relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in a relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Will be required to travel on overnight assignments.
  • You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Duties: As the Senior Member of the Cyber Security Foundations directorate, you will be accountable for:

  • Leading multi-functional teams in numerous areas of Cybersecurity and acquisition.
  • Understanding threat environments.
  • Completing vulnerability assessments.
  • Crafting system architecture and recommending requirements to insert into the acquisition lifecycle.
  • Aligning with cybersecurity initiatives and coordinating with the DoD and the AF.
  • Synchronizing with technical staff in CERT and SEI programs to deliver cybersecurity technical expertise to NC3.

Knowledge, Skills and Abilities: We are looking for qualified individuals that can demonstrate the following characteristics:

  • Experience in software engineering, development and/or systems engineering
  • An understanding of DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF)
  • Expertise in building, leading, managing and participating on multi-functional, technological teams
  • Engage effectively with all organizations within the software and acquisition communities
  • Interact diplomatically with partners, customers and sponsors and preferred knowledge of nuclear weapons systems is desired

You should retain detailed knowledge of cybersecurity and mission assurance in the acquisition process. Have strong written and verbal communications skills and the ability to present to high visibility partners internal and external to the organization. Also, someone that has shown their project and programmatic management skills and be able to collaborate with clients by developing proposals and establishing relationships with new and existing government clients. You should demonstrate the knowledge to mitigate risks, manage staff planning and handle budgeting needs. You will also need to lead and participate in multidisciplinary teams.

Desired Experience:

  • Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Job Function Breakdown:

65% NC3 Leader - Participate as a leader or member of technical teams in support of NC3 Weapon System acquisition program office.

20% Business Development - Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10% Other Duties- Other duties as assigned by management

5% Advisory for SEI - Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

TOTAL=100%

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

03 Oct
2017
Senior Software Assurance Engineer - 2007079
Pittsburgh, PA or Arlington, VA

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position to help improve cybersecurity of the NC3 Weapons System (Nuclear Command, Control and Communication). We expect the position to be highly visible and deeply impactful to assist senior leaders of the Air Force program to increase the cyber resiliency of NC3 throughout the lifecycle spanning from the requirements, development, deployment and sustainment.

Requirements:

  • Bachelor's degree or equivalent degree in a relevant discipline with ten (10) years applicable experience; MS or equivalent degree in a relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in a relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Will be required to travel on overnight assignments.
  • You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Duties: As the Senior Member of the Cyber Security Foundations directorate, you will be accountable for:

  • Leading multi-functional teams in numerous areas of Cybersecurity and acquisition.
  • Understanding threat environments.
  • Completing vulnerability assessments.
  • Crafting system architecture and recommending requirements to insert into the acquisition lifecycle.
  • Aligning with cybersecurity initiatives and coordinating with the DoD and the AF.
  • Synchronizing with technical staff in CERT and SEI programs to deliver cybersecurity technical expertise to NC3.

Knowledge, Skills and Abilities: We are looking for qualified individuals that can demonstrate the following characteristics:

  • Experience in software engineering, development and/or systems engineering
  • An understanding of DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF)
  • Expertise in building, leading, managing and participating on multi-functional, technological teams
  • Engage effectively with all organizations within the software and acquisition communities
  • Interact diplomatically with partners, customers and sponsors and preferred knowledge of nuclear weapons systems is desired

You should retain detailed knowledge of cybersecurity and mission assurance in the acquisition process. Have strong written and verbal communications skills and the ability to present to high visibility partners internal and external to the organization. Also, someone that has shown their project and programmatic management skills and be able to collaborate with clients by developing proposals and establishing relationships with new and existing government clients. You should demonstrate the knowledge to mitigate risks, manage staff planning and handle budgeting needs. You will also need to lead and participate in multidisciplinary teams.

Desired Experience:

  • Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Job Function Breakdown:

65% NC3 Leader - Participate as a leader or member of technical teams in support of NC3 Weapon System acquisition program office.

20% Business Development - Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10% Other Duties- Other duties as assigned by management

5% Advisory for SEI - Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

TOTAL=100%

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

03 Oct
2017
CERT Engagement Lead - 2007082
Arlington, VA

What We Do: The Software Engineering Institute (SEI) is the applied research institute as part of world renowned Carnegie Mellon University. The SEI performs state of the art research advancing the principles and practices of software engineering, cybersecurity, and application of the most advanced information technology. The SEI advances the creation of cyber secure information systems using advanced information technology and inventing the best software practices to deliver results on time, in budget, and without defects, every time. The SEI disseminates knowledge and collaborates with defense and government, industry, and academia to fulfill its mission.

Position Summary:

  • Do you have excellent cyber security technical skills?
  • Can you communicate clearly to cyber security floor operations personnel and senior leaders?
  • Do you want to help secure the nation and its critical infrastructure from cyber attack?
  • We will combine our team of technical experts and your skills to guide our nation to better cybersecurity outcomes.
  • You as the engagement lead will work in your specialty area while representing the larger body of work to sponsor senior leaders.
  • We are an equal opportunity employer searching for the best skills possible. We have great benefits for both you and your partner or family.
  • We combine a flexible work environment with state of the art technology to make a national impact for the nations cyber security needs.

We have expertise in all phases of cyber security: security requirements definition, security systems engineering, secure coding, vulnerability testing & discovery, endpoint assessment, malware reverse engineering, network security analysis, and policy. We work on groundbreaking security problems facing the nation. You can join our team.

You will research new vulnerabilities and security techniques. You will participate in the larger security community internal to CERT and externally giving presentations and attending conferences. Your will represent your expertise and the work of the whole organization to our sponsors.

Requirements:

  • You have a bachelor degree in computer science / computer engineering or related discipline with ten (10) years of prior experience or a master degree with five (5) years of prior experience.
  • You can travel both locally and remotely to sponsor sites to give presentations and attend meetings.
  • You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Desired Experience:

  • Experience researching or developing novel new security techniques or vulnerability discovery.
  • Experience working in or with computer or network security operations centers.
  • Programming and development experience with significant software systems or embedded development systems.

Job Function Breakdown:

40% - Works with team leads, technical managers, and technical directors to manage portfolio of research and development projects to support sponsor and to understand sponsor needs

30% - Leads sponsor support, gathers requirements, and develops technical work in support of sponsor and internal development teams

30% - Engages various communities presenting the work of CERT and capturing new advances in cyber security

TOTAL = 100%

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/. You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

02 Oct
2017
Digital Intelligence Technical Manager - 2007061
Pittsburgh, PA

Which devices should you take or prioritize when conducting a raid in a special operations mission? Can a vehicle navigation system be more valuable than a cellphone in a terrorism investigation? How do you maintain the velocity of an investigation or incident response when there are hundreds of terabytes of data to analyze from myriad devices and platforms? What is the next generation of technologies Federal Law Enforcement, the Department of Defense (DoD) and the US Intelligence Community (USIC) should be concerned about? How can you quantify the operational risk — and value — that arises through the use of consumer electronics, social media, and commercial communication networks?

Who we are:

The CERT Digital Intelligence team seeks to develop cutting edge solutions to address critical and emerging challenges encountered by the DoD, Federal Law Enforcement, and US Intelligence Community. Key to our success is a diverse team of researchers, scientists, and engineers with a passion for understanding the implications of emerging technologies on US Government defensive and offensive missions.

Who we are looking for:

You should be a strong technical leader with a solid background in digital exploitation and capable of identifying gaps between theory and practice. You will be responsible for the development and execution of a strategic vision and roadmap that advances the state of the art and practice for both defensive and offensive cyber operations. Your role will provide leadership to a diverse team working across the following areas:

  • Platform assessment
    • Hardware and systems analysis to assess the appropriateness of technological solutions based on their intended use or application.
    • Analysis of non-traditional systems with potential forensic/operational value.
  • Mobile devices and applications
    • Development of tools and methods to enable rapid analysis of mobile devices and applications for the purposes of understanding their value in digital operations as well as the potential privacy implications inherent to their use.
  • Identity Intelligence and Resolution
    • Development of science-based approaches for identifying and correlating users from unrelated or non-obvious digital artifacts.
  • Red Teaming
    • Engineering and design of focused threat-based analyses to determine the efficacy of technical solutions and approaches to US Government challenges.
  • Non-traditional forensics
    • Research and development of tools and methods for forensic analysis of non-traditional devices with potential forensic or operational value. These may include, but are not limited to, embedded systems, wearables, IoT devices, gaming consoles, vehicle-based systems, etc.
  • Radio/Spectral Research and Analysis
    • Analysis of emerging consumer technologies related to low-powered radios, cellular, and other means of communication.

Team deliverables include technical publications; industry and government conference presentations; course development and delivery; direct customer engagement; and prototype tools and techniques.

Requirements:

  • Master’s degree, preferably in Electrical/Computer Engineering, Computer Science, Machine Learning, Mathematics, or equivalent field with 5+ years of post-degree experience.
  • Technical publication and presentation experience. Demonstrated technical proficiency with contemporary computing hardware, software and network technologies.
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate Travel (20%)
  • You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Desired Experience:

Candidates with the following experience are preferred:

  • Exploratory data analysis
  • Software/Hardware debugging and prototyping
  • Reverse-engineering and vulnerability discovery
  • Technical management of staff, projects, and customer deliverables
  • Customer and community engagement

Job Function Breakdown:

30% Manages group to effectively implement the SEI and task order work plans. Sets goals and objectives and manages operational and functional business activities. Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).

30% Provides guidance to and monitors the success of team and project leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility. Provides oversight of team leads and their supervisory responsibilities of technical staff and conducting performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff.

20% Sets technical agenda of the technical area. Leads planning process and contribute to the development the CERT strategic plan. Matures the state of the art/state of practice for areas of responsibility. Ensures regular update of technical area’s plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy. Articulates vision for internal and external audiences. Engages with current and future customers to pursue growth and evolution of work.

10% Identifies opportunities for new technical projects and manages start-up of new, high-priority technical programs of work. Works with leadership to develop and implement a funding and transition plan for new work areas.

10% Directs organizational effectiveness and staff learning and development plans. Identifies operational success measures and process improvements. Leads corrective action.

100% Total Effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/. You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

27 Sep
2017
Senior Software Assurance Engineer - 2007007
Operating Location Boston - Bedford, MA

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

12 Sep
2017
SEI Fall Internship Opportunities 2017
Pittsburgh, PA

We are looking for Fall Interns, part-time, 20 hours/week. If you are a student looking to expand your education beyond what you can learn in school, and earn money doing it, we want you to come work with us! You’ll have an opportunity to work on cutting-edge projects while adding experience to your resume. Our interns do real work: writing code, analyzing data, and collaborating as valuable team members.

What We Do: The SEI helps advance software engineering principles and practices and serves as a national resource in software engineering, computer security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia to continually improve software-intensive systems. Our core purpose is to help organizations improve software engineering capabilities and develop or acquire the right software, defect free, within budget and on time, every time.

Internship opportunities may be available in the following areas:

  • Programming
  • Cybersecurity Research
  • Design / Communication
  • Software Design/Development
  • Project Management
  • Computer Engineering
  • Help Desk Support
  • Computer Science
  • Information Systems
  • Management Information Systems
  • Mathematics
  • Statistics
  • Systems Engineering
  • Malware Analysis

Requirements:

  • You must be currently enrolled in a degree granting program.
  • You will be subject to a background check and must be eligible to work in the United States without Visa sponsorship.

Check for our positions on Handshake!

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

16 Aug
2017
Cyber Security Engineer - 2006484
Pittsburgh, PA

What We Do: The CMU/SEI Forensic Operations and Investigations team is a cutting edge analytical resource focusing on critical U.S. Government (USG) needs. For the past 10 years, we have provided analytical and operational support on high-profile investigations, including numerous activities both nationally and internationally . Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. We combine our applied research with the unique talents, operational experience, research capabilities, and vast knowledge base to develop new tools and methods to address cyber security limitations and critical gap areas.

Are you creative, curious, energetic, collaborative, technology-focused, and hard-working?

Position Summary:

In this role you will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. You will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital analysis and applied research in emerging areas of cybercrime. You will build interdisciplinary approaches to problem solving, and demonstrate strong presentation and instructional skills.

Requirements:

  • BS Computer Science or other related discipline and a minimum of eight (8) years of related experience
  • MS in the same fields with four or more (4+) year’s relevant experience in analysis of digital artifacts or incident response
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (25%)
  • You will be subject to a background investigation and need to be eligible to obtain and maintain a Department of Defense security clearance

Duties Include:

  • Ability to pay close attention to detail, meet deadlines, work under stress, and communicate effectively
  • Design, develop, pilot and deliver products. Required to accurately represent FOI and its technical work in interactions with customers, sponsors, and the public
  • Act independently using CMU and SEI defined policies, practices, and procedures
  • Interact with clients and staff of all levels in a highly professional and competent manner

Knowledge, Skills, and Abilities:

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis
  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls
  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP(S), TLS, DNS, SMTP, TCP/IP, ICMP, JSON, REST
  • 2+ years with some of the following scripting languages: SQL, Python, JavaScript, Perl, PHP and/or shell scripting
  • Understanding of Routing protocols for Cisco and Routers
  • Understanding of server/client/operating systems
  • Penetration Testing
  • Knowledge of common vulnerabilities, exploits and mitigations
  • Digital artifact analysis (host, network, mobile devices and IoT)
  • Incident Response
  • Ability to research and characterize security threats including defining appropriate countermeasures
  • Virtual infrastructure and hypervisors

Job Functions Breakdown:

65% Operational support for SEI customers.

10% Perform applied research in emerging areas of digital forensics.

15% Deliver technical and management training to customers.

5% Mentor, guide and interact with team and other staff.

5% Contribute to the research and technical agendas of the FOI.

100% Total Effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

09 Aug
2017
Associate Security Engineer - 2004653
Arlington, VA

What We Do: The CERT Program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. CERT engages in state of the art research and development in computer security to raise the bar across the Nation and globally.

Position Summary: As part of the Security Automation Team, you will contribute to the successful operation of a test and integration lab used for prototyping and evaluating various technologies and security defense methods. We are looking for a security professional who will analyze data sets to identify potential incidents, profile network traffic, and assess the latest tools/methods as well as support the daily operations of the environment. The goal of the lab is to promote collaboration and sharing of information across the program groups within SEI and the various customer support teams.

Requirements:

•BS with three (3) years or MS with one (1) year of applicable experience. Your concentration of study should be in computer science, software engineering, computer engineering, or a related quantitative field of study.

•Willingness to travel to visit other offices and attend conferences and training. Moderate travel (15%).

•You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Knowledge, Skills and Abilities:

Are you the type of person who likes to take the initiative to get things done and solve complex problems? Are you looking for a job that allows you to make a difference? Apply your skills and dedication to protecting our Nation from cyber security threats and join our team to solve these complex problems.

•You are comfortable investigating new software from vendors or open source projects including its installation and assessment of basic capabilities.

•You are passionate about sharing new information and brainstorming ideas with other team members.

•You have the ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; ability to deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff;

•You have the ability to grasp the big picture, direction, and goals of an effort; ability to quickly learn new procedures, techniques, approaches, etc.

Desired Experience:

•You have worked in a "security operations" environment gaining an understanding of how to analyze logs and traffic to evaluate potential security events

•You will be accountable for monitoring and administration of systems requiring integration and automation using scripts (Python, Ruby, Perl) and packages like Puppet and Ansible.

•You will interact with our customers and provide demonstrations that highlight the use of various technology solutions to meet program requirements.

Job Functions or Responsibilities:

40% Monitor and analyze available data to assess the state of operations and develop new techniques.

30% Manage hardware and software to include all appropriate system administration tasks and processes; provision for new requirements and growth.

25% Evaluate new solutions on behalf of internal and external users.

5% Contribute to the broader security community.

100% total effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/. You can join an institution that inspires innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

11 Jul
2017
Windows Systems Administrator - 2006119
Arlington, VA

What We Do: The Software Engineering Institute (SEI) helps advance software engineering principles and practices and serves as a national resource in software engineering, cyber security, and process improvement. The SEI works closely with defense and government organizations, industry, and academia. Our core purpose is to help organizations to continually improve the quality and security of software-intensive systems.

Position Summary: The Accredited Systems Administrator (ASA) is a hands-on information system administration and security at the SEI. Are you a cleared IT professional with great Windows systems administration experience? Are you interested in DoD Informational Assurance (IA) and industrial security roles? If so, then this ASA role in Arlington, VA may be the opportunity for you. As an SEI ASA, you would join our dedicated Information Assurance team within the Office of the CIO (OCIO IA). Join us to help create, improve, and operate secure services for classified work at the SEI.

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s degree in Computer Science, Information Technology, or related field, or equivalent combination of training and experience. Current Microsoft server certifications such as MCSA Windows Server 2008, etc.

Licenses: One or more of: CAP, CASP CE, Security+CE, SSCP, GSEC

Experience: Three or more (3+) years of system and network administration experience using modern system administration tools in a Microsoft Windows infrastructure. At least two years under government cognizance (e.g., DISA, DSS) confirming audit records and STIG compliance for accredited Windows systems.

Skills/Abilities: Proficiency in Windows administration commands/utilities and processes such as those used to manage software, Group Policy Objects, and other aspects of Active Directory. Experience applying analytical skills to solve server and network problems based on examination of events/alerts and system logs.

Mobility: Infrequent business travel required (e.g., training, other SEI locations, etc.) Computer hardware installation and configuration required at times involving objects typically <= 30 pounds (heavier objects with assistance).

Environmental Conditions: Normal office conditions, close contact with computer displays for prolonged periods of time.

Mental: Skill at communicating with parties with diverse perspectives (e.g., IT administrators, IA professionals, researchers, etc.) to review options and resolve issues, sometimes under pressure. Temperament and maturity to self-motivate and prioritize tasks with input from a remotely located manager is critical to success in this role.

Other: You will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance. You need to meet and maintain DoD 8570-M readiness requirements within six (6) months of employment at SEI’s expense. Additional work hours may be necessary at times (e.g., you may need to stay at or report to work during incidents and/or emergencies).

Preferred Qualifications and Requirements:

Licenses: Active CISSP (or Associate), GSLC, CISM, GSEC

Experience: Prior experience as an associate ISSO / ISSM (IAO/IAM) in a small-scale classified enclave. Prior use of the HBSS and ACAS tool chains, Security Content Automation Protocol (SCAP) validation tools, and awareness of NISPOM IS-relevant rules are valuable skills.

Other: Active Department of Defense security clearance.

Accountability:

  • Ensures server(s) and client stations are operating efficiently and resolves issues impacting their use.
  • Recommends and performs modifications to improve server/service performance and reliability.
  • Shares information with other IA team members to increase situational awareness of operational status.
  • Executes proper handling (e.g., safe storage, proper marking, approved destruction) of equipment, documents and media used in the operation and maintenance of accredited systems.
  • Contributes information relating to new equipment and facility needs each budget planning session to improve and create services.
  • Implements information system safeguards and local operating procedures to satisfy certification requirements and works with the ISSM and ISSO in Pittsburgh to align SEI practices to Arlington operations.

Direction:

  • Works under limited supervision from a remote manager as a member of the IA team. Most work is performed independently, or with others in the IA, IT, and Security teams.
  • Maintains and securely operates services based on guidance from the ISSM, FSO, and senior management.

Decisions:

  • Identifies user and systems issues and resolves most issues independently.
  • Information security issues and complex operational problems are handled collaboratively with IA teammates and folks in the IT or Security staff.

Supervisory Responsibilities:

  • No formal staff supervisory responsibilities, but may task other personnel in order to address infractions or post-inspection issues.
  • Conducts training for new users of the systems in scope.

Job Functions or Responsibilities:

  • 25% - Install, configure, and maintain accredited servers, workstations and network devices in accordance with most current STIG or other relevant documents. Work with users to solve problems related to the systems.
  • 15% - Review server logs directly or with analysis tools to discern operational anomalies, including operational threats (e.g., resource contention/exhaustion) and security concerns; addresses and/or discusses these with IA colleagues or IT as appropriate.
  • 10% - Report on the operational status of accredited information systems based on reviews and scans to accrediting agencies, possibly through established channels such as ACAS, HBSS, etc. We review extraordinary findings within the entire IA team.
  • 10% - Perform C&A duties including the submission of accreditation documents prepared by or in collaboration with the SEI ISSM. Coordinate IS-related self-inspection activities and SVA / CCRI preparations for accredited systems in Arlington and are the on-site IA contact for the local DSS IS representative in Arlington.
  • 10% - Help SEI staff members be more effective in their mission by facilitating access to accredited resources. This involves performing classified IS user indoctrination briefings and IT accounts / credentials creation for classified systems, including required recordkeeping (account lifecycle, DoD IAA training status, policy acknowledgements, etc.).
  • 10% - Support the FSO to prepare for traditional security inspection activities, self-inspections, etc. Function as the secondary COMSEC custodian for the SEI Arlington office responsible for device inventory, key management and loading, etc. Provide backup FSO/CSSO coverage as directed.
  • 15% - Cover enterprise IT duties in a supplemental capacity as directed.
  • 5% - Participate in training and professional development opportunities to keep current with evolving and new technologies and regulations.

100% Total Effort

Organizational Chart: CIO < Deputy CIO < ASA

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/. You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

05 Jul
2017
Senior Cyber Security Engineer - 2006080
Pittsburgh, PA

What We Do: The CMU/SEI Forensic Operations and Investigations team is a cutting edge analytical resource focusing on critical U.S. Government (USG) needs. For the past 10 years, we have provided analytical and operational support on high-profile investigations, including numerous activities both nationally and internationally. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. We combine our applied research with the unique talents, operational experience, research capabilities, and vast knowledge base to develop new tools and methods to address cyber security limitations and critical gap areas.

Are you creative, curious, energetic, collaborative, technology-focused, and hard-working?

Position Summary: In this role you will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. You will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital analysis and applied research in emerging areas of cybercrime. You will build interdisciplinary approaches to problem solving, and demonstrate strong presentation and instructional skills.

Requirements:

  • BS Computer Science or other related discipline and a minimum of ten (10) years of related experience
  • MS in the same fields with eight or more (8+) year’s relevant experience in analysis of digital artifacts or incident response
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (25%)
  • You will be subject to a background investigation and need to be eligible to obtain and maintain a Department of Defense security clearance

Duties Include

  • Ability to pay close attention to detail, meet deadlines, work under stress, and communicate effectively.
  • Act independently using CMU and SEI defined policies, practices, and procedures.
  • Design, develop, pilot and deliver products. Required to accurately represent FOI and its technical work in interactions with customers, sponsors, and the public.
  • Interact with clients and staff of all levels in a highly professional and competent manner.

Knowledge, Skills, and Abilities:

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis
  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP(S), TLS, DNS, SMTP, TCP/IP, ICMP, JSON, REST
  • 4+ years with some of the following scripting languages: SQL, Python, JavaScript, Perl, PHP and/or shell scripting
  • Experience with C/C++, Java, Swift, Objective C
  • Understanding of Routing protocols for Cisco and Routers
  • Understanding of server/client/operating systems
  • Penetration Testing
  • Knowledge of common vulnerabilities, exploits and mitigations
  • Digital artifact analysis (host, network, mobile devices and IoT)
  • Incident Response
  • Ability to research and characterize security threats including defining appropriate countermeasures
  • Virtual infrastructure and hypervisors
  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

Job Function Function Breakdown:

  • 65% Operational support for SEI customers
  • 10% Perform applied research in emerging areas of digital forensics
  • 15% Deliver technical and management training to customers
  • 5% Mentor, guide and interact with team and other staff
  • 5% Contribute to the research and technical agendas of the FOI

100% Total Effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

05 Jul
2017
Cyber Security Analyst - 2006085
Pittsburgh, PA

What We Do: The CMU/SEI Forensic Operations and Investigations team is a cutting edge analytical resource focusing on critical U.S. Government (USG) needs. For the past 10 years, we have provided analytical and operational support on high-profile investigations including numerous activities both nationally and internationally. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. We combine our applied research with the unique talents, operational experience, research capabilities, and vast knowledge base to develop new tools and methods to address cyber security limitations and critical gap areas.

Are you creative, curious, energetic, collaborative, technology-focused, and hard-working?

Position Summary: In this role you will serve in a multi-disciplinary position providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. You will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital analysis and applied research in emerging areas of cybercrime. You will build interdisciplinary approaches to problem solving, and demonstrate strong presentation and instructional skills. You will also interact with clients and staff of all levels in a highly professional and competent manner.

Requirements:

  • BS Computer Science or other related discipline and a minimum of three (3) years of related experience
  • MS in the same fields with one or more (1+) year’s relevant experience in analysis of digital artifacts or incident response
  • Willingness to travel to various locations to support the SEI's overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (25%)
  • You will be subject to a background investigation and need to be eligible to obtain and maintain a Department of Defense security clearance

Duties Include

  • Ability to pay close attention to detail, meet deadlines, work under stress, and communicate effectively.
  • Design, develop, pilot and deliver products. Required to accurately represent FOI and its technical work in interactions with customers, sponsors, and the public.
  • Research and characterize security threats including defining appropriate countermeasures.
  • Interact with clients and staff of all levels in a highly professional and competent manner.
  • Act independently using CMU and SEI defined policies, practices, and procedures.

Knowledge, Skills, and Abilities:

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis
  • Understanding of common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls
  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP(S), TLS, DNS, SMTP, TCP/IP, ICMP, JSON, REST
  • 1+ years with some of the following scripting languages: SQL, Python, JavaScript, Perl, PHP and/or shell scripting
  • Understanding of Routing protocols for Cisco and Routers
  • Penetration Testing
  • Understanding of server/client/operating systems
  • Knowledge of common vulnerabilities, exploits and mitigations
  • Digital artifact analysis (host, network, mobile devices and IoT)
  • Incident Response
  • Ability to research and characterize security threats including defining appropriate countermeasures
  • Virtual infrastructure and hypervisors

Job Function Breakdown:

70% Operational support for SEI customers.

10% Perform applied research in emerging areas of digital forensics.

15% Deliver technical and management training to customers.

5% Contribute to the research and technical agendas of the FOI.

100% Total Effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

05 Jul
2017
Junior Cyber Security Analyst - 2006086
Pittsburgh, PA

What We Do:

The CMU/SEI Forensic Operations and Investigations team is a cutting edge analytical resource focusing on critical U.S. Government (USG) needs. For the past 10 years, we have provided analytical and operational support on high-profile investigations, including numerous activities both nationally and internationally . Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. We combine our applied research with the unique talents, operational experience, research capabilities, and vast knowledge base to t develop new tools and methods to address cyber security limitations and critical gap areas.

Are you creative, curious, energetic, collaborative, technology-focused, and hard-working?

Position Summary:

In this role you will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. You will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital analysis and applied research in emerging areas of cybercrime. You will build interdisciplinary approaches to problem solving, and demonstrate strong presentation and instructional skills.

Requirements:

  • BS Computer Science or other related discipline and a minimum of one (1) year of related experience
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (25%)
  • You will be subject to a background investigation and need to be eligible to obtain and maintain a Department of Defense security clearance

Duties Include:

  • Ability to pay close attention to detail, meet deadlines, work under stress, and communicate effectively.
  • Design, develop, pilot and deliver products. Required to accurately represent FOI and its technical work in interactions with customers, sponsors, and the public.
  • Research and characterize security threats including defining appropriate countermeasures.
  • Interact with clients and staff of all levels in a highly professional and competent manner.

Knowledge,Skills, and Abilities:

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis
  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls
  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP(S), TLS, DNS, SMTP, TCP/IP, ICMP, JSON, REST
  • 1+ years with some of the following scripting languages: SQL, Python, JavaScript, Perl, PHP and/or shell scripting
  • Understanding of Routing protocols for Cisco and Routers
  • Understanding of server/client/operating systems
  • Penetration Testing
  • Knowledge of common vulnerabilities, exploits and mitigations
  • Digital artifact analysis (host, network, mobile devices and IoT)
  • Incident Response
  • Virtual infrastructure and hypervisors

Job Function Breakdown:

70% Operational support for SEI customers.

10% Perform applied research in emerging areas of digital forensics.

15% Deliver technical and management training to customers

5% Contribute to the research and technical agendas of the FOI

100% Total Effort

Benefits:

Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/ . You can join an institution and inspire innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

05 Jun
2017
Senior Cyber Security Engineer - 2005737
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the CERT Division. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with ten (10) years’ experience, or equivalent combination of training and experience.

Certifications: Certified Information Systems Security Professional (CISSP), and/or Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA) and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as an information security engineer, network security architect, information systems auditor, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common risk and cybersecurity assessment methods
  • Data analytics and cybersecurity metrics
  • Cybersecurity laws, regulations, and standards
  • Common network security architectures
  • Common networking protocols and services
  • Cyber security, survivability, and resilience concepts and issues
  • Software and systems engineering
  • Building and maintaining customer relationships
  • Strategic Planning and requirements definition
  • Process improvement
  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, security assessment methods, and telecommunications systems
  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards
  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues
  • Working knowledge of the DoD and federal agency resilience needs and cyber security roadmaps
  • Development and delivery of information and infrastructure security risk and vulnerability evaluations
  • Ability to conduct analytical studies and investigations
  • Reasoning and problem-solving skills
  • Ability to work independently with limited supervision
  • Ability to interact effectively with diverse constituencies internally and externally
  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure
  • Ability to recognize and deal appropriately with confidential and sensitive information
  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks
  • Leadership and mentoring skills
  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations
  • Ability to work on customer sites with high-ranking members of federal agencies and DoD
  • Participation in professional society activities, particularly IEEE and ACM

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects
  • Work meticulously with careful attention to detail
  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff
  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with eight (8) years’ experience or equivalent experience.

Certifications: Offensive Security Certified Professional (OSCP), and/or GIAC Penetration Tester (GPEN), and/or Certified Ethical Hacker (CEH), and/or Certified Information Systems Security Professional (CISSP), and/or Certified Information Systems Auditor (CISA)

Experience:

  • Expert experience in risk and cybersecurity assessment methods
  • Advanced knowledge of network security architectures
  • Expert knowledge in cybersecurity laws, regulations, and standards
  • Expert experience in data analytics and cybersecurity metrics
  • Experience with common penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap
  • Experience with common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

Job Functions or Responsibilities:

60% Participate in cybersecurity assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cybersecurity and operational resilience; transition research into applied knowledge for customers.

10% Deliver courses in operational resilience management, cybersecurity management, and information security risk management

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.

100% Total Effort

Organizational Chart: Director, CERT Division < Technical Director, Cyber Risk and Resilience< Technical Manager, Cybersecurity Assurance Team < Senior Cyber Security Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

30 May
2017
Software Engineer - 2005658
Pittsburgh, PA

Position Summary: We are looking for someone familiar with compilers (particularly dataflow analysis or other forms of static analysis) to work on projects developing techniques for automatically repairing source code to remove certain common classes of vulnerabilities.

Software vulnerabilities constitute a major threat to many of our nation’s mission-critical systems. Static analysis tools help identify these bugs, but they typically are used late in the development process and produce an enormous number of warnings, overwhelming the ability of the development team to fix the code. Automated code repair holds the potential to eliminate security vulnerabilities much faster and at a much lower cost than manual repair.

The Secure Coding team of the world-renowned CERT division of the Software Engineering Institute is a pioneer of the identification and development of secure coding and secure software development practices. Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will participate in research and engineering projects related to developing secure software systems, write reports and deliver presentations that explain the findings of their work, and work directly with customers to help transition our work into practice.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science or Software Engineering with three (3) years of applicable experience, or equivalent knowledge and ability. Familiarity with compilers at least to the level of an undergrad compilers course, especially dataflow analysis. Firm grasp of data structures and algorithms.

Skills/Abilities:

Successful candidates will have the ability to:

  • Develop and analyze source code in C and C++
  • Build and configure various software build environments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Analyze data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Contribute in a team environment with other team members with varying skills, experience and locations
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in source code of large software systems, and to identify opportunities for improvements to the development process.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions: Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science or Software Engineering, with one (1) year of applicable experience.

Skills/Abilities: Thorough knowledge of the C programming language. Basic familiarity with x86 assembly language. Ability to read and write code in Python. Ability to write an analysis pass for LLVM. Ability to develop software that exhibits desired security properties. Ability to evaluate software for desired security properties.

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged. Most normal duties and responsibilities are handled independently with the use of established procedures and policies. Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

Job Functions or Responsibilities:

40% Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

30% Directly support customer work in secure coding, verification and validation techniques, and technical training. Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations. Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

15% Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15% Develop knowledge and understanding of SEI capabilities; learn how SEI capabilities can be applied to customer problems; work directly with SEI staff supporting the community with disciplines related to secure coding and secure development.

100% TOTAL EFFORT

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Software Engineer.

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

#seijob

30 May
2017
Compiler Researcher - 2005656
Pittsburgh, PA

Position Summary: We are looking for someone familiar with compilers (particularly dataflow analysis or other forms of static analysis) to work on projects developing techniques for automatically repairing source code to remove certain common classes of vulnerabilities.

Software vulnerabilities constitute a major threat to many of our nation’s mission-critical systems. Static analysis tools help identify these bugs, but they typically are used late in the development process and produce an enormous number of warnings, overwhelming the ability of the development team to fix the code. Automated code repair holds the potential to eliminate security vulnerabilities much faster and at a much lower cost than manual repair.

The Secure Coding team of the world-renowned CERT division of the Software Engineering Institute is a pioneer of the identification and development of secure coding and secure software development practices. Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will participate in research and engineering projects related to developing secure software systems, write reports and deliver presentations that explain the findings of their work, and work directly with customers to help transition our work into practice.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science or Software Engineering with 3 years of applicable experience, or equivalent knowledge and ability. Familiarity with compilers at least to the level of an undergrad compilers course, especially dataflow analysis. Firm grasp of data structures and algorithms.

Skills/Abilities:

Successful candidates will have the ability to:

  • Develop and analyze source code in C and C++
  • Build and configure various software build environments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Analyze data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Contribute in a team environment with other team members with varying skills, experience and locations
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in source code of large software systems, and to identify opportunities for improvements to the development process.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions: Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science or Software Engineering, with 1 year of applicable experience.

Skills/Abilities: Thorough knowledge of the C programming language. Basic familiarity with x86 assembly language. Ability to read and write code in Python. Ability to write an analysis pass for LLVM. Ability to develop software that exhibits desired security properties. Ability to evaluate software for desired security properties.

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged. Most normal duties and responsibilities are handled independently with the use of established procedures and policies. Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

Job Functions or Responsibilities:

40% Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

30% Directly support customer work in secure coding, verification and validation techniques, and technical training. Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations. Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

15% Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15% Develop knowledge and understanding of SEI capabilities; learn how SEI capabilities can be applied to customer problems; work directly with SEI staff supporting the community with disciplines related to secure coding and secure development.

100% TOTAL EFFORT

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Associate Software Engineer.

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

04 May
2017
Software Engineer - 2005395
Pittsburgh, PA or Arlington, VA

Position Summary: CERT is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT engages in cutting-edge research and development, and provides robust programs focused on ensuring that software developers, internet security experts, network and system administrators, and others are able to resist, recognize, and recover from attacks on networked systems.

As a member of CERT Systems Team, the selected candidate will be responsible for designing, developing, and deploying software applications and systems to enhance the capabilities of CERT customers. The candidate will participate in all phases of the software development lifecycle, and will be involved in key decisions regarding software design and technology selection, architecture and design of cyber-resilient and cyber-secure systems.

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, computer engineering, or a related quantitative field of study with five (5) years of applicable experience.

Experience: Experience as a software developer working on software applications in a professional environment. Experience writing code and applications in Java, experience with a scripting language such as Perl or Python, proficiency with HTML/CSS/JavaScript, and familiarity with SQL and modern databases. Capable of working with software development tools such as version control systems (Git, Mercurial) and bug tracking systems (JIRA); working knowledge of agile software development practices and team design sessions. Experience developing within a UNIX/Linux environment.

Skills/Abilities: Ability to function within a development team. Willingness to learn new skills, programming languages, and technologies as necessary. Desire to solve challenging problems through technical innovation. Ability to analyze customer requirements and provide novel solutions. Ability and willingness to provide accurate estimates of development time and risk. Excellent written and verbal communication skills. Ability to work effectively without close supervision. Capable to attend customer meetings and respond to customer requirements

Mobility: Primarily sedentary, long periods of sitting, may have to travel to other campus locations, as well as, travel to customer sites, some bending, stretching and lifting. Moving and setting up computer equipment.

Environmental Conditions: Normal office conditions; however close contact with a computer screen for prolonged periods of time.

Mental: Ability to work under pressure and meet deadlines; ability to prioritize tasks; strong learning capability; ability to assist users of varying competency; ability to interact effectively with vendors, managers, and technical staff. Good technical problem-solving skills; strong information organization skills; good oral and written communication skills. Maintain confidentiality of sensitive information.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in computer science, software engineering, computer engineering, or a related quantitative field of study with three (3) years of applicable experience.

Certifications: CISSP or CSSLP

Experience: Working knowledge of general networking concepts and experience with deep software analysis, debugging, or reverse engineering, with a background in cyber security or cyber analytics. Experience with Hadoop and related big-data systems, relational databases, LDAP directories, Apache httpd and Tomcat, and working within a development and operations (DevOps) environment. Experience coding with C, C++, C#, Scala, Ruby and other commonly used languages. Familiarity with No SQL and non-relational database technologies such as MongoDB. Cassandra, HBase, Neo4j or others.

Skills/Abilities: Ability to multitask, troubleshoot and work with end users. Ability to quickly learn new technologies (COTS/GOTS) and integrate them with existing applications and/or systems. Knowledge of various hardware architectures and embedded systems. Embedded system design and embedded software implementation.

Accountability: Develop and implement project technical results. Contribute to program objectives and plans development. Keep in confidence sensitive information such as security, and site-specific information.

Direction: Regular interaction with supervisor. Expected to act in accordance with SEI and CERT program procedures and policies, such as those involving product development, team interaction, and confidentiality.

Decisions: Must accurately represent the program in interactions with customers, sponsors, and the public. Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities: This position does not formally supervise others. However, the individual may act in a technical leadership (non-supervisory) role in regard to specific work products and activities, or in regard to student interns, etc.

Job Functions or Responsibilities:

90% Design and implementation of software requirements and integrate with other software tools or relational databases.

Secondary Functions

5% Contribute to conferences and meetings; participate in marketing calls on clients; give technical talks as appropriate.

5% Contribute to the broader software engineering and security community.

100% TOTAL EFFORT

Organizational Chart: CERT Program, Director < Secure Automation Director < Systems Technical Manager < Software Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

#seijob

04 May
2017
Systems Engineer - 2005396
Pittsburgh, PA or Arlington, VA

Position Summary: CERT is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT engages in cutting-edge research and development, and provides robust programs focused on ensuring that software developers, internet security experts, network and system administrators, and others are able to resist, recognize, and recover from attacks on networked systems.

This position is responsible for supporting users and maintaining software and equipment in the CERT Program Managed Enclaves. This includes understanding the needs of the teams using the enclaves, designing and developing services to meet those needs, planning equipment acquisitions, overseeing configuration and maintenance of equipment, overseeing set-up and breakdown of equipment for experiments, assisting in experiments as needed. You will need to be a self-starter who can work in a rapidly changing environment, tolerate ambiguity, and demonstrate problem-solving skills.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Information Science, Computer Engineering or equivalent with eight (8) years of applicable experience, MS in Computer Science, Information Science, Computer Engineering or equivalent with five (5) years of applicable experience, or Ph.D. in Computer Science, Information Science, or equivalent with two (2) years of applicable experience.

Experience: System administrator level of knowledge for both UNIX and Windows operating systems, as well as experience with the selection, configuration and deployment of associated hardware and software. Experience and knowledge in using system administration tools to manage dozens of machines and configurations. Network administrator knowledge of network technologies including: TCP/IP, UDP, Ethernet, 802.11, routing protocols, DNS, VPN. Experience in network architecture and implementation. Storage administration and scripting/coding experience.

Skills/Abilities: Ability to manage heavy workload and effectively manage priorities. Strong problem solving skills. Excellent oral and written communications skills. Ability to work both independently and with teams. Ability to effectively manage multiple projects. Ability to elicit technical requirements from management and staff.

Mobility: Primarily sedentary, long periods of sitting, may have to travel to other campus locations, as well as, travel to customer sites, some bending, stretching and lifting. Moving and setting up computer equipment.

Environmental Conditions: Normal office conditions; however close contact with CRT for prolonged periods of time. Also occasional work in machine room (loud and extreme office temperatures 55F-90F).

Mental: Ability to work under pressure and meet deadlines; ability to prioritize tasks; strong learning capability; ability to assist users of varying competency; ability to interact effectively with vendors, managers, and technical staff. Good technical problem-solving skills; strong information organization skills; good oral and written communication skills. Maintain confidentiality of sensitive information.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Experience: Experience using and managing virtual computing environments such as VEEAM, VMWare, or VirtualBox. Experience with applications such as JIRA, Confluence, Jenkins, and Rhodecode. Experience in the scription such as Bash, Python, Perl, and PowerShell. Experience with storage administration such as NetApp, Lustre Filesystem, Gluster Filesystem, iSCSI, and NFS.

Experience with Hadoop Administration and Database Administration (MySQL, Postgress, MongoDB).

Skills/Abilities: Ability to define and build tools in various scripting and programming languages. Knowledge of and experience with operating systems other than UNIX or Windows.

Accountability: Responsible for managing requests from users, including high priority requests originating from a sponsor.

Direction: The person in this position will work closely with the SEI Infrastructure Team on developing processes for managing hardware and software. The person will also work closely with users in determining needs and planning experiments.

Decisions: Example 1: A user needs to test vulnerability in a specific piece of software. A test environment needs to be developed to allow for testing at the required version/patch level. The equipment needs to be prepared and configured appropriately to provide a suitable test environment.

Example 2: A group of software developer needs an automated build, test, and deployment environment and the environment needs to be integrated with the already existing source code repository. An evaluation of suitable tools is conducted, based on developer requirements. Based on the selection, a server is setup and tested in order to demonstrate the integration and functionality. Then assistance is provided to developers as they begin using the system, including the adoption of changing requirements and configuration needs.

Supervisory Responsibilities: This position mentors and provides technical direction to other CERT Program Managed Enclave employees.

Job Functions or Responsibilities:

15% Collects user requirements for CERT Program Managed Enclave equipment software and services needed for the CERT.

15% Test, evaluate, and select new hardware and software for the CERT Program Managed Enclave in consultation with the SEI IT and users.

15% Work with the CERT and SEI IT staff to develop and/or implement tools and processes for managing and maintaining software and hardware in the CERT Program Managed Enclave, including the set-up for experiments.

40% Infrastructure operations and maintenance including: backups, patching, Failure Recovery, log review, security auditing, and other user support.

10% Develop procedures and practices for the use and maintenance of the CERT Program Managed Enclave.

SECONDARY FUNCTIONS

5% Participate in the broader security community through collaboration, papers, and presentations.

100% TOTAL EFFORT

Organizational Chart: CERT Program, Director < Secure Automation Director < Technical Manager < Systems Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

#seijob

04 May
2017
Systems Engineer - 2005397
Pittsburgh, PA or Arlington, VA

Position Summary: CERT® is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT engages in cutting-edge research and development, and provides robust programs focused on ensuring that software developers, internet security experts, network and system administrators, and others are able to resist, recognize, and recover from attacks on networked systems.

This position is responsible for supporting users and maintaining software and equipment in the CERT Program Managed Enclaves. This includes understanding the needs of the teams using the enclaves, installing and configuring software and hardware to meet those needs, configuration and maintenance of equipment, and assisting in experiments as needed. You will need to be able to work in a rapidly changing environment, tolerate ambiguity, and demonstrate problem-solving skills.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Information Science, Computer Engineering or equivalent with three (3) years of applicable experience, or MS in Computer Science, Information Science, Computer Engineering or equivalent with one (1) year of applicable experience.

Experience: Three (3) years of experience; Windows/Linux systems administration, as well as experience with the configuration and deployment of associated hardware and software, including storage administration, scripting, and coding.

Skills/Abilities: Ability to effectively manage conflicting priorities, while still delivering concrete, high quality, and timely results to multiple projects. Posses strong planning and organizational skills, including the ability to; work independently and with teams, interact effectively with technical and non-technical audiences both written and verbally. Strong problem solving skills. Possess an applied understanding of core internet protocols (e.g., TCP/IP, IP, UDP, ICMP, DNS, SMTP, HTTP, etc.) and Windows/Linux systems administration practices. An understanding of Software / systems development lifecycle, QA testing, revision control, and change management practices.

Mobility: Primarily sedentary, long periods of sitting, may have to travel to other campus locations, as well as, travel to customer sites, some bending, stretching and lifting up to 50 lbs. above head. Moving and setting up computer equipment.

Environmental Conditions: Normal office conditions; however close contact with CRT for prolonged periods of time. Also occasional work in machine room (loud and extreme office temperatures 55F-90F).

Mental: Ability to work under pressure and meet deadlines; ability to prioritize tasks; strong learning capability; ability to assist users of varying competency; ability to interact effectively with vendors, managers, and technical staff. Good technical problem-solving skills; strong information organization skills; good oral and written communication skills. Maintain confidentiality of sensitive information.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Experience: Experience with applications such as JIRA, Confluence, Jenkins, and Rhodecode. Experience in the scription such as Bash, Python, Perl, and PowerShell. Experience with storage administration such as NetApp, Lustre Filesystem, Gluster Filesystem, iSCSI, and NFS. Experience with Hadoop Administration and Database Administration (MySQL, Postgress, MongoDB).

Skills/Abilities: Ability to define and build tools in various scripting and programming languages. Knowledge of and experience with operating systems other than UNIX or Windows.

Accountability: Develop and implement project technical results. Contribute to technical area goals and objectives. Keep in confidence sensitive information such as security, vulnerability, and site information.

Direction: Expect to act with minimal supervision in accordance with SEI and CERT program procedures and policies, such as those involving project development, team interaction, and confidentiality.

Decisions: Must accurately represent the program in interactions with customers, sponsors, and the public. Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities:

This position does not formally supervise others.

Job Functions or Responsibilities:

10% Perform Tier 1 support for CERT Program Managed Enclave services and systems.

10% Test, and evaluate new hardware and software for the CERT Program Managed Enclaves in consultation with SEI IT and users.

25% Work within CERT and SEI IT to develop and/or implement tools and processes for managing and maintaining software and hardware in the CERT Program Managed Enclaves, including the set-up for experiments.

35% Conduct routine software and hardware maintenance of CERT Program Managed Enclaves equipment. Install and configure new equipment.

10% Develop procedures and practices for the use and maintenance of the CERT Program Managed Enclaves.

10% Participate in the broader security community through collaboration, papers, and presentations.

100% TOTAL EFFORT

Organizational Chart: CERT Program, Director < Secure Automation Director < Technical Manager < Systems Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

16 Mar
2017
Network Defense Analyst - 2005075
Pittsburgh, PA

Who We Are: You will work within the Monitoring & Response Directorate of the CERT Division of the Software Engineering Institute (SEI). The SEI is a federally funded research and development center on the campus of Carnegie Mellon University in Pittsburgh. CERT engages with the US Government, mainly the defense and intelligence sectors, to research, develop, apply and transition complex cybersecurity solutions. CERT generates some of the highest level of original research and tackles many of the most complex problems facing cybersecurity for the US Government. You will be part of a team that is thoughtfully engaged with its clients involved in emerging technology gaps and aggressively solving problems to migrate solutions to our clients.

What We Do:The CERT Situational Awareness group works with government customers to help them protect and defend their networks. We pioneer innovative ways to monitor and safeguard networked systems. We develop new approaches for identifying and investigating network anomalies. We observe real-world security operations teams and help them improve how they do their jobs. Our work ranges in scope from the close-up investigation and examination of security data to the assessment of large, enterprise-wide networks.

About You:

  • You want to make an impact beyond your organization.
  • You want to be involved with worldwide thought leaders.
  • Your strengths are curiosity, love of learning, deep interest in cybersecurity, and a desire to innovate.

Position Summary: As a Network Defense Analyst, you will participate in and lead technical efforts which include developing and prototyping new security analysis techniques, tools, and platforms. You will prepare analytic reports and contribute to research publications. You will serve as a domain expert for customers, commercial vendors, and the Internet community as a whole. We expect you to contribute to and advance the state of art of cybersecurity analytics. Are you interested in helping us to achieve this mission?

Requirements:

  • BS in Computer Science or a related discipline with eight (8) years experience in security operations, network operations, or security research; MS in Computer Science or a related discipline with five (5) years experience in security operations, network operations, or security research; PhD in Computer Science or related discipline with two (2) years experience in security operations, network operations, or security research; or equivalent combination of education and experience.
  • Travel to various locations within the SEI and CMU community, including sponsor sites, conferences, and meetings. (expected 10-25%)
  • You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.

Knowledge, Skills and Abilities:

  • Capable of conducting and supporting analytical studies and investigations of network security data.
  • Significant understanding of and practical experience with various Internet protocols and applications (e.g., TCP/IP, HTTP/HTTPS, DNS, SMTP, FTP, routing protocols).
  • Understanding of network, host, and operating system security issues.
  • Operational knowledge and significant understanding of network security devices such as Intrusion Detection Systems, Firewalls, Security Information Managers, Network Vulnerability Scanners.
  • Operational knowledge and understanding of routing and switching protocols, including Internet routing.
  • Ability to function in the role of a consultant with some mentorship from senior staff members.
  • Excellent planning and organizational skills.
  • Strong analytical skills.
  • Excellent oral and written communication skills.
  • Ability to work well with minimal direction and with teams.
  • Ability to discuss security topics with both technical and nontechnical audiences, and to communicate with customers at various levels of leadership.
  • Ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities.
  • Ability to participate in conversations collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff.
  • Ability to develop and communicate new ideas; ability to quickly learn new procedures, techniques, and approaches.

Desired Experience:

  • Experience working in a collaborative environment with team members who have diverse skills.
  • Participation in the public forum of the broader information security community.
  • Prior experience working directly with customers from government and/or industry.
  • Experience with data visualization.
  • Skilled at working with specialized technologies such as data mining, clustering, machine learning, neural networks, distributed computing and/or big data platforms.
  • Strong statistics background.
  • Scripting and/or programming in a high level language, including participation in sound software engineering (e.g. version control, documentation).

Job Functions Breakdown:

60% Participate in studies of data from operational networks, and advise network operators in written reports and presentations on security improvements based on those studies.

35% Participate in the development of novel approaches to network security analysis, and build prototype tool implementations.

5% Speak publicly and to customers on work performed.

100% total effort

Benefits: Our benefits philosophy encompasses three driving priorities: Choice, Control, and Well-being. Learn more at https://www.cmu.edu/jobs/benefits-at-a-glance/. You can join an institution that inspires innovations that change the world.

Carnegie Mellon University is a welcoming workplace that considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

#seijob

09 Feb
2017
Cyber Security Engineer - 2004923
Pittsburgh, PA or Arlington, VA

This position is located in Arlington, VA.

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the CERT Division. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with eight (8) years’ experience, or equivalent combination of training and experience.

Certifications: Certified Information Systems Security Professional (CISSP), and/or Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA) and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as an information security engineer, network security architect, information systems auditor, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common risk and cybersecurity assessment methods
  • Data analytics and cybersecurity metrics
  • Cybersecurity laws, regulations, and standards
  • Common network security architectures
  • Common networking protocols and services
  • Cyber security, survivability, and resilience concepts and issues
  • Software and systems engineering
  • Building and maintaining customer relationships
  • Strategic Planning and requirements definition
  • Process improvement
  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, security assessment methods, and telecommunications systems
  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards
  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues
  • Working knowledge of the DoD and federal agency resilience needs and cyber security roadmaps
  • Development and delivery of information and infrastructure security risk and vulnerability evaluations
  • Ability to conduct analytical studies and investigations
  • Reasoning and problem-solving skills
  • Ability to work independently with limited supervision
  • Ability to interact effectively with diverse constituencies internally and externally
  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure
  • Ability to recognize and deal appropriately with confidential and sensitive information
  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks
  • Leadership and mentoring skills
  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations
  • Ability to work on customer sites with high-ranking members of federal agencies and DoD
  • Participation in professional society activities, particularly IEEE and ACM

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects
  • Work meticulously with careful attention to detail
  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff
  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications: Offensive Security Certified Professional (OSCP), and/or GIAC Penetration Tester (GPEN), and/or Certified Ethical Hacker (CEH), and/or Certified Information Systems Security Professional (CISSP), and/or Certified Information Systems Auditor (CISA)

Experience:

  • Expert experience in risk and cybersecurity assessment methods
  • Advanced knowledge of network security architectures
  • Expert knowledge in cybersecurity laws, regulations, and standards
  • Expert experience in data analytics and cybersecurity metrics
  • Experience with common penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap
  • Experience with common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

Job Functions or Responsibilities:

60% Participate in cybersecurity assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cybersecurity and operational resilience; transition research into applied knowledge for customers.

10% Deliver courses in operational resilience management, cybersecurity management, and information security risk management

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.

100% Total Effort

Organizational Chart: Director, CERT Division < Technical Director, Cyber Risk and Resilience< Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

11 Jan
2017
Senior Software Security Engineer - 2004716
Pittsburgh, PA

Position Summary: The Secure Coding Team, of the world renowned CERT division of the Software Engineering Institute, is a pioneer of the identification and development of secure coding and secure software development practices. We are looking for exceptional candidates to help us continue our legacy of ground-breaking improvements for securing software during development. Software has never been more important to our lives and our national security, nor has software insecurity ever been a greater risk.

Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, develop tools to evaluate and improve software, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will lead and participate in research and engineering projects that identify and implement best practices for organizations to develop secure software systems. This will include developing and applying guidelines for writing secure code in C, C++, Java, and other popular languages. It also includes developing and using tools to verify that software is developed securely. The candidate will work directly with customers to: develop and provide training in secure coding practices; evaluate, extend, and use tools to improve and automate source code analysis; review and improve code bases to ensure that best practices are being followed; and enhance the customers’ organizational capabilities to produce secure software systems. The candidate will be expected to write reports and deliver presentations that explain the findings of research and software evaluations, helping customers improve their software to meet the security and privacy needs of their users.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Software Engineering, Information Science, or Information Systems Management with ten (10) years applicable experience.

Skills/Abilities: Successful candidates will have the ability to:

  • Develop and analyze source code in common programming languages such as C, C#, C++, Java, and Python, with a focus on secure coding principles and practices
  • Use static and dynamic analysis tools to evaluate software to find and remove vulnerabilities
  • Build and configure various software build enviornments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Develop and implement novel and advanced software analysis techniques
  • Develop and modify compilers and interpreters, understanding the underlying computer and compiler architectures, algorithms, performance trade-offs, and impact of optimization techniques on security issues
  • Lead projects in a team environment with other team members with varying skills, experience and locations
  • Plan and organize the evaluation approach for projects, including the collection and analysis of data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in large software systems, and to identify development process improvement opportunities.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions: Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with challenges while maintaining composure; work with sensitive information.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science, Software Engineering, Information Science, or Information Systems Management with eight (8) years applicable experience; or PhD in those disciplines with five (5) years applicable experience.

Skills/Abilities:

  • Work with DoD and other US Government software-intensive systems programs and software maintenance groups, understanding their unique needs, proposing and closing work to meet their needs, and lead projects to develop solutions that address their secure software development and acquisition needs.
  • Representing DoD and US Government program constituency and perspective based on experience to other team members to aid in developing relevant research and development proposals and solutions.
  • Transitioning knowledge, tools, and other work products from research projects to DoD and other US Government partners.
  • Develop approaches to address software assurance in the risk management framework context.
  • Develop and analyze software for specific platforms, such as mobile platforms and embedded systems.
  • Evaluate software assurance using a range of methods, such as dynamic and binary analysis, model checking, assertions, and semantic formalizations.

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged. Most normal duties and responsibilities are handled independently with the use of established procedures and policies. Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

Job Functions or Responsibilities:

40% Lead and directly support customer work in secure coding, verification and validation techniques, and technical training. Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations. Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

30% Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

15% Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15% Develop knowledge and understanding of SEI capabilities; influence new SEI capabilities to be more applicable to customer problems; work directly with other SEI staff supporting the community with disciplines related to secure coding and secure development, sometimes in leadership role.

100% TOTAL EFFORT

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Senior Software Security Engineer

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

#seijob

11 Jan
2017
Software Security Analyst - 2004717
Pittsburgh, PA

Position Summary: The Secure Coding Team, of the world renowned CERT division of the Software Engineering Institute, is a pioneer of the identification and development of secure coding and secure software development practices. We are looking for exceptional candidates to help us continue our leadership of ground-breaking improvements for securing software during development. Software has never been more important to our lives and our national security, nor has software insecurity ever been a greater risk.

Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, develop tools to evaluate and improve software, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will participate in research and engineering projects that identify and implement best practices for organizations to develop secure software systems. This will include developing and applying guidelines for writing secure code in C, C++, Java, and other popular languages. It also includes developing and using tools to verify that software is developed securely. The candidate will work directly with customers to: develop and provide training in secure coding practices; evaluate, extend, and use tools to improve and automate source code analysis; review and improve code bases to ensure that best practices are being followed; and enhance the customers’ organizational capabilities to produce secure software systems. The candidate will be expected to write reports and deliver presentations that explain the findings of research and software evaluations, helping customers improve their software to meet the security and privacy needs of their users.

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Software Engineering, Information Science, or Information Systems Management with three (3) years applicable experience.

Skills/Abilities: Successful candidates will have the ability to:

  • Develop and analyze source code in common programming languages such as C, C#, C++, Java, and Python, with a focus on secure coding principles and practices
  • Use static and dynamic analysis tools to evaluate software to find and remove vulnerabilities
  • Build and configure various software build environments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Analyze data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Contribute in a team environment with other team members with varying skills, experience and locations
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in large software systems, and to identify development process improvement opportunities.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions: Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with challenges while maintaining composure; work with sensitive information.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science, Software Engineering, Information Science, Information Systems Management with one (1) year applicable experience.

Skills/Abilities: Develop and analyze software for specific platforms, such as mobile platforms and embedded systems.

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged. Most normal duties and responsibilities are handled independently with the use of established procedures and policies. Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

Job Functions or Responsibilities:

40% Directly support customer work in secure coding, verification and validation techniques, and technical training. Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations. Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

30% Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

15% Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15% Develop knowledge and understanding of SEI capabilities; learn how SEI capabilities can be applied to customer problems; work directly with SEI staff supporting the community with disciplines related to secure coding and secure development.

100% TOTAL EFFORT

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Software Security Analyst.

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

#seijob

Apply for Positions

To apply for open positions visit Careers at the Software Engineering Institute.

Search for Positions

Interested in working with us?

Search positions

Accessibility Needs for Applicants, Students and Visitors

Carnegie Mellon University makes every effort to provide physical and programmatic access individuals with disabilities. If you require an accommodation to participate in any part of the employment process, please contact Disability Resources by emailing access@andrew.cmu.edu or calling 412-268-3930.

Carnegie Mellon University considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.

Error in element (see logs)