CERT-SEI

Careers

Working at the CERT Division provides opportunities to have an impact on cybersecurity. At the CERT Division, you will have the chance to research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to help improve security.

The dynamic work environment at the CERT Division comes from our operating principles. At the CERT Division, we

  • advocate an entrepreneurial responsibility to develop new products and services, serve new customers, and increase our impact across the community
  • take informed risks, support each other in taking risks, and then celebrate our successes or learn from our mistakes
  • recognize the value of professional growth and take advantage of opportunities to increase subject matter knowledge and leadership capabilities

We work to ensure that systems management practices and technology, survivability engineering methods, network attack detection tools, and skilled staff are used to resist, recognize, and recover from attacks on networked computer systems. Our work environment is collaborative in nature as staff members work on cross-functional teams within the CERT Division, the Software Engineering Institute, other Carnegie Mellon departments, and across the global community.

Staff members say that one of the most satisfying aspects of working in the CERT Division "is being able to contribute to a global community that can impact the state of internet security."

To learn more about the program's technical areas of work, please see About Us. To learn more about working at the CERT Division, see Our Place at Carnegie Mellon University and Living in Pittsburgh.

Current Job Listings

The position you are looking for is not available. Please take a look at our current open positions listed below.

Select Job Location

Sort by Date Posted Title Location

21 May
2015
Cyber Security Engineer - Exercise Developer - 2001000
Pittsburgh, PA or Arlington, VA

This position has multiple openings and can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with three (3) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with one (1) years of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

21 May
2015
Cyber Security Engineer - Exercise Developer - 2001001
Pittsburgh, PA or Arlington, VA

This position has multiple openings and can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with three (2) years of applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with one (1) year of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

05 May
2015
Project Manager - 2000906
Pittsburgh, PA

Position SummaryThe person in this position will provide project management services to small to medium projects with increasing complexity within the Cyber Security Foundations (CSF) technical directorate of the CERT division in the Software Engineering Institute. The position will report to the CSF Project Management Manager. The person should be able to take technical, customer facing projects from original concept and initiating through final implementation and closing, integrating structured project management methodology and tools. The person will be accountable for project planning, scheduling, budget, risk assessment, execution progress, and general monitoring and controlling throughout the project cycle. The person is expected to facilitate communications for project teams, sponsors, customers, and university constituents. The project manager will consult, partner with, and provide reports to multi-departmental stakeholders, technical managers, financial and business services and vendors. The project manager may direct/garner technical or staff resources at various stages in the project cycle and has shared accountability for project outcomes.

Minimum Qualifications and Requirements:

 Education/Training: Master's degree in Business, Management, Systems Engineering or related field or equivalent combination of training and experience.

License: Project Management Professional (PMP).

Experience: Five to seven (5-7) years of increasingly responsible project management experience using a structured methodology and formal tools/approaches. Experience should include managing projects of various sizes and complexity. 

Skills/Abilities: Position requires managing multiple projects simultaneously, experience in business process analysis and redesign, testing methodologies, and quality assurance and change management processes. Strong project planning and management skills. Ability to consult with management on short-term and longer-term technical planning needs. General understanding and application of project management theory and technologies. Ability to function in a team environment, providing constructive feedback. Good interpersonal skills including conflict resolution and facilitation. Good oral and written communication skills with technical and non-technical staff including documentation skills. Strong knowledge and experience in Microsoft products including: Word, Excel, Access, Project, Visio and PowerPoint. 

Physical / Mobility:  Candidate must be able to sit and work from a computer monitor for long periods of time and may have to travel to other campus locations and to customer locations (US domestic travel).

Environmental Conditions:  Work is usually performed in an office setting; close contact with computer for extended periods of time is required.

Mental:  Ability to work under pressure; meet inflexible deadlines; deal with difficult individuals while maintaining composure; ability to creatively solve problems.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.Evening and weekend work may be required to meet deadlines.

 

Preferred Qualifications and Requirements:

Education/Training: Degree in Computer Science, Software Engineering, Computer Engineering, or related field or equivalent in education and experience is preferred.

Experience: Experience with IT online authoring tools (web, wiki, SharePoint) is desirable.  Experience working in higher education is preferred.  Experience in technical projects (IT, software, cybersecurity) is preferred.  Experience managing research projects is preferred. Experience in supervisory roles is preferred.

 

Accountability:  Establishes priorities and develops project plans and schedules. Reviews project or program requirements and priorities with the project stakeholders, vendors and end users, including feasibility cost and time requirements. Revises priorities and project plans as appropriate. Creates project teams and delegates appropriate responsibilities to maximize departmental effectiveness. Supervises team progress and holds team accountable towards fulfillment of goals and ensures adherence to deadlines and budget. Provides updates on project progress. Allocates resources and manages implementation and ongoing support as well as planning for future needs. Ensures appropriate standards and procedures are followed.

Direction:  The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work and works under general supervision.

Decisions:  Expected to act independently. Functions within broad precedents and policies.

Supervisory Responsibilities:  May supervise lower level project administrators and/or student workers.

 

Job Functions or Responsibilities:

50%      Manage budgets, resources and deliverables for existing projects.

20%      Plan new projects and proposals.

10%      Facilitate resolution of budget, schedule and deliverable conflicts.

10%      Participate in and/or lead presentations to customers and management.

10%      Participate in strategic organizational planning and process revision.

100% Total Effort

 

Organizational Chart:  CERT Program, Director > CERT Program, Technical Director for Cyber Security Foundations > CERT Program, Project Management Manager for Cyber Security Foundations > Project Manager for Cyber Security Foundations

  

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

23 Apr
2015
Cybersecurity Community Developer - 2000854
Arlington, VA

Position Summary: This position is with the CERT Coordination Center (CERT/CC) at the Software Engineering Institute (SEI) of Carnegie Mellon University. The CERT Coordination Center is world renowned for excellence in neutral, unbiased expert analysis and opinion on technical issues involving cyber security and has played a key role in internet security since 1988.

This position is a technical position which also requires extensive customer and community interaction.  It will involve working with several key government stakeholders to include the Department of Homeland Security (DHS) and Department of Defense (DoD).  It will also require working closely with private sector organizations, specifically critical infrastructure and key resources, to build effective shared analysis and collaboration capabilities to better their organizations and national security interests from cyber-attacks and threats.  

Role:

As a Cybersecurity Community Developer, you will work closely with the cyber security analysts in the public and private sectors to define and implement effective information and cyber analysis capabilities supporting incident analysis and response activities for organizations with national or economic security impact. You will often collaborate with these entities to develop processes and models for effective incident information analysis, technical mitigation development, and product development for dissemination to designated stakeholders.  You will also work with mature critical owner/operators and government stakeholders to develop models for sector-wide cybersecurity information sharing and analysis capabilities.

This position will be responsible the development and delivery of key strategic projects in support of the CERT/CC Incident Analysis team. The candidate selected for this role will also act as a liaison between the CERT/CC and its sponsors for strategic projects, ensuring complete understanding of sponsor requirements. As appropriate, you will work with CERT/CC Incident Analysis team leadership to identify and leverage internal and external resources to meet project timelines, and will perform technical work to contribute to the deliverables.

In addition, you will have an opportunity to explore new and innovative ways in which SEI's technical competencies and capabilities can be applied to current and future technical challenges faced by the constituency. This includes, but is not limited to areas such as malicious code, vulnerability, network traffic, and incident analysis.

Responsibilities:

  • Develop model for information sharing and analysis capabilities in support of the critical infrastructure sectors to include gathering requirements and developing models for capabilities to meet those requirements.

  • Provide CERT/CC and DHS leadership with situational awareness of team strategic projects, and respond appropriately to changing priorities or requirements.

  • Develop and maintain collaborative relationships with sponsors and partners and assisting them in strengthening their analysis and cyber defense capabilities, providing on-site support as necessary.

  • Foster collaboration and information sharing amongst entities within the community.

  • Explore new ways to leverage and apply SEI's expertise to protect the infrastructure of critical infrastructure and other national security interests.

  • Work to continually improve the tools, processes, and systems utilized within the community.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science Information Science, Information Systems Management with eight (8) years applicable experience; or MS with five (5) years of experience.

Experience: Must have experience participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the cybersecurity community.  Must have understanding of the DoD, DHS and critical infrastructure cybersecurity communities.  Successful candidates should possess “hands-on” experience with computer/network security and IT system and network administration.  The individual must possess knowledge/experience in network design and troubleshooting and have deep knowledge of standard networking protocols.

Skills/Abilities:  Successful candidates will:

  • possess excellent analytical and problem-solving skills;

  • have a strong interest in and basic knowledge of network and computer operations and security issues;

  • be able to make decisions independently and in a self-directed manner in support of the goals of the team and organization;

  • be motivated to tackle challenging problems, and leverage subject matter expertise when available and appropriate;

  • have excellent organizational skills;

  • be able to work meticulously with careful attention to detail;

  • strong customer service skills;

  • ability to work in a team environment with other team members with variety of skills;

  • ability to work remotely or with minimal direct supervision and represent CERT/CC and SEI capabilities to the sponsor;

  • be able to communicate effectively within a team environment;

  • be able to effectively prioritize work;

  • be able to develop and explain technical decisions;

  • recognize and deal appropriately with confidential and sensitive information;

  • interact effectively with technical and non-technical audiences via both verbal and written communications;

  • be able to quickly learn new procedures, techniques, and approaches.

Physical Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions; however close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.       

Other:    U.S. Citizenship is required. Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. This position will work full-time in the Pittsburgh SEI CERT/CC location. Candidate will be required to travel on overnight assignments.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science Information Science, Information Systems Management with six years applicable experience.

Licenses: Current Information System Security Profession (CISSP) or similar certification, Project Management Professional (PMP).

Experience: Ideal candidates will have experience or substantial knowledge in many of the following additional areas:

  • three to five (3-5( of experience in security aspects of system and/or network administration in a U.S. government agency or contractor environment and/or 5 years of experience as a cyber (technical) analyst in an intelligence, counterintelligence or law enforcement role;

  • experience drafting and formatting technical threat intelligence reports and conduct correlating research using multiple formatted and unformatted data sources;

  • experience developing materials for senior leadership in government or industry;

  • experience developing and implementing information security policies and standard operating procedures;

  • advanced understanding of security vulnerabilities;

  • practical network security training (e.g. SANS GIAC Level 2 courses, CCNP, CCIE Security);

  • advanced forensic or digital media analysis experience.

Skills/Abilities:  Preferred candidates will have the ability to adjust quickly to shifting priorities and make quick decisions with limited information.

 

Accountability: Contributes to program objectives and plans development.  Maintains confidentiality of sensitive information such as security, vulnerability, and site information.

Direction:  Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions:  Must accurately analyze data from multiple sources, generate defensible results, and represent them in interactions with customers, sponsors, and the public. Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities:  This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:

80%      Develop model for information sharing and analysis capabilities to include gathering requirements and developing models for capabilities to meet those requirements. Manage projects, including production of standardized reports, metrics, project status, and other reports as required. Coordinate and collaborate with partner and counterpart organizations. Deliver reports, briefings, and assessments to leadership, facilitating understanding of cyber threat entities and environments. Support information assurance and cyber threat mitigation decision-making.

15%      Work to build collaborative relationships and foster information sharing among partner entities in the interest of improving cyber analysis and response capabilities.

5%       Developing knowledge and understanding of SEI capabilities; learning how SEI capabilities can be applied to customer problems.

100%      Total Effort

 

Organizational Chart: CERT Program Director > Cyber Threat and Vulnerability Analysis CERT/CC Tech Director > CERT/CC Incident Analysis Technical Manager > Cybersecurity Community Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

23 Apr
2015
Senior Cyber Security Engineer - 2000852
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cyber Risk Management Team within the Cyber Security Solutions Directorate.  The CRM team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to identify, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.  The individual will conduct applied research and perform assessments, diagnostics, and analysis techniques to better understand and mitigate risks to cyber environments and the organizational processes that depend on them.  Activities will include close work with customers from a variety of organizations, including DoD, government agencies, and commercial organizations.

 

Minimum Qualifications and Requirements:

 

Education/Training: BS in computer science, software engineering, information systems, or a related scientific/technical field with ten (10) years’ experience, or equivalent combination of training and experience.

 

Experience: Professional experience as a system or network administrator, software engineer, information systems analyst, database administrator or similarly technical occupation. Experience with and applied knowledge in:

  • information technology and telecommunications systems;

  • cyber security, survivability, and resilience concepts and issues;

  • software and systems engineering;

  • building and maintaining DoD customer relationships;

  • data Analytics and quantitative measures;

  • strategic Planning and requirements definition;

  • process Improvement;

  • program planning, budgeting, and management.           

Skills/Abilities:  Must exhibit the following skills and abilities:

  • understanding of information technology and telecommunications systems;

  • working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards;

  • working knowledge of DHS critical infrastructure sectors and related security and resilience issues;

  • working knowledge of the DoD and Agency resilience needs and cyber security roadmaps;

  • development and delivery of information and infrastructure security risk and vulnerability evaluations;

  • ability to conduct analytical studies and investigations;

  • reasoning and problem-solving skills;

  • ability to work independently with limited supervision;

  • ability to interact effectively with diverse constituencies internally and externally;

  • ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure;

  • ability to recognize and deal appropriately with confidential and sensitive information;

  • ability to implement project plans, monitor project budgets, and identify and mitigate project risks;

  • leadership and mentoring skills;

  • excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations;

  • ability to work on customer sites with high-ranking members of the Federal Government and US Military to define customer requirements;

  • participation in professional society activities, particularly IEEE and ACM.

Physical/Mobility: Primarily sedentary in an office setting with some mobility.  Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • take or share leadership role in technical projects;

  • work meticulously with careful attention to detail;

  • meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities;

  • deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff;

  • ability to understand the big picture, direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other:  Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: MS in computer science, software engineering, information systems, or a related scientific/technical field with eight (8) years’ experience; PhD in computer science, software engineering, information systems, or a related scientific/technical field with five (5) years’ experience, or equivalent combination of training and experience.

Licenses: CISSP, CISM, GIAC, or similar; certifications from the audit discipline (such as CISA) are also acceptable.

Experience: In addition to the minimum experience above, preferred experience includes:

  • experience in both physical and cyber aspects of security; familiarity with resilience concepts;

  • familiarity with process improvement models such as CMMI or SixSigma, TQM, ISO9000, CERT-RMM;

  • familiarity with standards for measurement (including ISO 15939);

  • familiarity with NIST 800-series standards for information security;

  • familiarity with the DoD DIACAP standard for information assurance certification and accreditation;

  • familiarity with standards for security (ISO 27000), business continuity (BS 25999), and IT operations (ISO 20000);

  • working in a team environment on collaborative projects in critical infrastructure sectors involving network, system or data security.

Experience employing software engineering techniques in designing and developing distributed, secure software, and experience with / knowledge of any of the following:

  • system administration:

  • firewalls, intrusion detection systems, and other security technologies:

  • application development/programming:

  • relational databases.

Skills/Abilities: In addition to the minimum skills/abilities above, preferred skills/abilities include:

  • ability to lead work teams as needed;

  • consulting skills;

  • demonstrated ability to deliver coursework and training.

 

Accountability:  The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development.  The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction:  The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions:  The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities:  This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors.   Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

30%        Participate in the examination, analysis, and documentation of assessments, diagnostics, and analysis techniques for information and infrastructure security; examine data on cyber security and technology risks to identify problem areas and propose mitigation alternatives.

25%        Participate in the delivery of existing NSS cyber security, resilience, and risk assessment and analysis approaches with customers and partners;  participate in research, analysis, and documentation of cyber security issues, concerns, and risks at customer locations.

20%        Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and resilience; transition research into applied knowledge for customers.

10%        Deliver courses in operational resilience management, cyber security management, and information security risk management.

5%          Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%          Contribute to and review the literature in cyber security, resilience, and software engineering.

5%          Provide assistance and input to other teams and projects within the SEI.

100% TOTAL EFFORT

 

Organizational ChartDirector, CERT Division > Technical Director, Cyber Security Solutions Directorate > Deputy Director, Cyber Security Solutions Directorate > Technical Manager, Cyber Risk Management Team > Senior Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

23 Apr
2015
Applied Statistician / Data Scientist - 2000855
Pittsburgh, PA or Arlington, VA

Position Summary: A small but growing team of data-centric researchers seeks an applied statistician / data scientist to work on established projects as well as develop new ones. Examples of current projects include developing metrics and experimental designs for large-scale cybersecurity research programs, researching human-in-the-loop machine learning, and performing both exploratory and automated analysis of large corpora of cybersecurity incident data. Though you may encounter big data problems in this position, we find that many of our most interesting challenges currently stem from data quality issues and limited sample sizes. You will have the opportunity to apply, learn, and develop new technical approaches.

You will be expected to work with teams of cybersecurity domain experts as well as other statisticians, and needn’t have previous cybersecurity experience of your own. Explicitly, you will be expected to co-author research proposals and execute applied research (i.e., design research studies and study materials, collect and analyze data, author publications, and present findings to DoD sponsors and academic conferences).

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s degree and an academic background in machine learning, statistics, or other related quantitative field with eight (8) years of experience; Master’s degree and an academic background in machine learning, statistics, or other related quantitative field with five (5) years of experience; PhD and an academic background in machine learning, statistics, or other related quantitative field with two (2) years of experience; or equivalent combination of training and experience. Candidates without a PhD should instead have experience demonstrating their knowledge of statistical theory and ability to perform research.

Experience: Two plus (2+) years of experience using statistical methods.

Skills/Abilities: An ideal candidate will have expertise in the following areas. Experience with specific tools and methods are less important to us than evidence that you can learn new tools and methods.

Statistics:

  • Design quantitative metrics with real-world utility and validity.
  • Apply a wide range of analysis techniques to diverse, potentially underspecified real problems.
  • Find, read about and evaluate theoretical results as needed.
  • Execute experimental design basics.
  • Advise on the feasibility, needs, and design of the data-centered component of new project proposals.
  • Design and evaluate data collection strategies aligned to project goals.

Hands-on data analysis:

  • Analyze data in R, Python or similar data analysis ecosystem.
  • Comfortably use tools for reproducible, documented data analysis.
  • Rapidly clean, refactor, explore, model, plot, and merge messy raw datasets.

Collaboration:

  • Work closely with subject-matter experts.
  • Communicate with people in other fields about technical statistical concepts.

Physical / Mobility:  Normal sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community.  May require some bending, stretching, pushing as well as lifting several reams of paper, etc.

Environmental Conditions:  Close contact with computer for extended periods of time.

Mental:  Ability to: meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; work in a team environment to achieve research objectives; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: PhD in machine learning statistics, or other related quantitative field.

Experience: Five plus (5+) years of experience in statistics or machine learning.

Skills/Abilities:

  • Strong software engineering skills
  • Cybersecurity experience
  • Experience supporting test and evaluation for large-scale government research programs.

 

Accountability:  The individual will work independently and within teams to achieve project goals.

Direction:  The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions:  The individual must be able to make decisions about the proper scope of assigned research.  This includes being able to discern applicable paper topics, making decisions regarding experimental design and methods, and exercising strong time management skills.  The individual must accurately represent the program in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  This position may involve the training and supervision of graduate students.

 

Job Functions or Responsibilities:

40%  Data analysis.

25%  Other types of research support including designing experiments and metrics.

15%  Participating in the research community, including attending and presenting at conferences, and reading and writing academic papers.

10%  Writing proposals and reports.                 

10%  Consulting and project planning with other groups in the SEI.

100% Total Effort

 

Organizational Chart:  CERT Program, Director > CERT Program, Technical Director for Cyber Security Foundations > Science of Cyber Security Research Manager > Applied Statistician / Data Scientist

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

16 Apr
2015
Computer Security Information Analyst - 2000827
Pittsburgh, PA or Arlington, VA

Position Summary: This position is with the CERT Coordination Center (CERT/CC) at the Software Engineering Institute (SEI) of Carnegie Mellon University. The CERT/CC is world renowned for excellence in neutral, unbiased expert analysis and opinion on technical issues involving cyber security, and has played a key role in internet security since 1988. The location for the position will be at or near the SEI office in Arlington, Virginia.

This position is highly technical, and will involve working with the Department of Homeland Security (DHS), Critical Infrastructure and Key Resources (CIKR) entities, and other security and governmental organizations to build effective information sharing and analysis capabilities to better protect national security interests from computer security threats.

Role: As a Computer Security Information Analyst, the successful candidate will work closely with cyber security analysts in the public and private sectors on a team supporting cyber information and analysis capability sharing to support risk management, incident analysis, and response activities. You will often collaborate with these entities to analyze incident and threat information, develop technical mitigations, and produce reporting to disseminate this information to designated stakeholders.

In addition, you will have an opportunity to explore new and innovative ways in which SEI's technical competencies and capabilities can be applied to current and future technical challenges faced by the constituency. This includes, but is not limited to areas such as malicious code, vulnerability, network traffic, and incident analysis.

Responsibilities:

  • Contribute to day-to-day operations of analysis team responsible for the creation of innovative analysis products based on information and capabilities available from the CERT/CC, government, and collaborators
  • Develop and lead execution of stakeholder analyst-to-analyst feedback processes to understand the needs of the constituency
  • Develop and maintain cooperative relationships with sponsors and collaborators, and assist them in strengthening their analysis and cyber defense capabilities, providing on-site support as necessary
  • Engage critical infrastructure stakeholders to identify their requirements for participation in cyber information sharing and collaboration programs with DHS and help the DHS leads to meet these requirements
  • Foster collaboration and information sharing amongst entities within the community
  • Develop and lead implementation of plan for the secure automated sharing of cybersecurity threat information with critical infrastructure stakeholders
  • Explore new ways to leverage and apply SEI's expertise to protect critical infrastructure and other national security interests
  • Work to continually improve the tools, processes, and systems utilized within the community

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Information Science, Information Systems Management, or a related field with eight (8) years applicable experience.

Experience: Candidate should have advanced computer security incident handling and analysis experience, be comfortable in Windows and Unix/Linux environments and be able to demonstrate knowledge in the following areas:

  • Understanding of commonly utilized communications protocols
  • Common attack and response methodologies
  • Identification and analysis of actionable computer security information
  • Basic system, network, and malware analysis
  • Basic understanding of security vulnerabilities and the impact that they can have on information systems
  • Administering, maintaining, and securing a small network
  • Theoretical underpinnings of computer security

As well as experience with:

  • Communicating complex technical issues to non-technical audiences
  • Understanding and managing risk in large enterprise infrastructures
  • Developing strategies to defend systems and networks from attacks

Skills/Abilities: Successful candidates will:

  • Possess excellent analytical and technical problem-solving skills
  • Possess strong customer service skills
  • Have a strong interest in and knowledge of network and computer security issues
  • Be able to make decisions independently and in a self-directed manner in support of the goals of the team and organization
  • Be motivated to tackle challenging problems
  • Have excellent organizational skills
  • Be able to work meticulously with careful attention to detail
  • Ability to contribute in a team environment with other team members with  varying skillsets and competencies
  • Ability to work remotely or with minimal direct supervision
  • Be able to communicate effectively within a team environment
  • Be able to effectively prioritize work
  • Be able to develop and explain technical decisions
  • Recognize and deal appropriately with confidential and sensitive information
  • Interact effectively with technical and non-technical audiences via both verbal and written communications
  • Be able to quickly learn new procedures, techniques, and approaches
  • Be able to identify the need for improvements, prototype solutions, and communicate requirements

Physical Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.     

Other:    U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. Candidate must be able to work full-time at a customer site in the Washington D.C. / Northern Virginia metro area. Candidate will be required to travel on overnight assignments.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science, Information Science, Information Systems Management with five years applicable experience

Licenses: Information systems security, incident response and analysis, and other similar certifications are desired

Experience: Ideal candidates will have experience or substantial knowledge in many of the following additional areas:

  • 3-5 of experience in security aspects of system and/or network administration in a U.S. government agency or contractor environment and/or experience as a cyber (technical) analyst in a computer network defense, intelligence, counterintelligence or law enforcement role
  • Experience drafting and formatting technical threat intelligence reports and conduct correlating analysis using multiple formatted and unformatted data sources and tool sets
  • Experience developing materials for senior leadership in government or industry
  • Experience developing and implementing information security policies and standard operating procedures
  • Advanced understanding of security vulnerabilities
  • Practical network security training (e.g. SANS GIAC Level 2 courses, CCNP, CCIE Security)
  • Advanced malware, forensic, or digital media analysis experience

 

Accountability:  Contributes to program objectives and plans development.  Maintains confidentiality of sensitive information such as security and vulnerability information.

Direction: Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Must accurately analyze data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public. Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities: This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:

65% Perform duties as a technical cyber information and fusion analyst team member, incident analyst and technical liaison. Review, analyze and correlate threat data from various sources. Create innovative reporting products based on available information and capabilities. Mentor others in conducting effective analysis, and develop standardized processes for performing analysis. Produce standardized reports, metrics, threat, activity, and mitigation information products. Coordinate and collaborate on cyber threat tracking with partner and counterpart organizations. Deliver reports, briefings, and assessments to leadership, facilitating understanding of cyber threat entities and environments. Support information assurance and cyber threat mitigation decision-making.

15% Work to build collaborative relationships and foster information sharing among partner entities in the interest of improving cyber situational awareness and response capabilities.

15% Work directly with SEI staff supporting the community with incident, vulnerability, network, or malicious code analysis work.

5% Develop knowledge and understanding of SEI capabilities; learning how SEI capabilities can be applied to customer problems.

100%      Total Effort

 

Organizational Chart: CERT Program Director > CERT/CC Technical Director > CSIRT Operations Technical Manager >Team Lead > Computer Security Information Analyst

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

10 Apr
2015
CERT/CC CSIRT Operations Technical Manager - 2000766
Pittsburgh, PA or Arlington, VA

Position Summary:  The CSIRT Operations technical area of the CERT Coordination Center (CERT/CC) supports USG Cyber Centers, SOCs, national coordination initiatives and the international response community through directed analysis, applied research and development and capacity building activities.  This approximately 20-person group works from the SEI’s Pittsburgh and Arlington offices, and is embedded at USG facilities in the Washington DC-Baltimore area.  The position of technical manager is responsible for all aspects of developing and executing the body of work to include setting the technical direction; managing financials; business development; and personnel issues.

Minimum Qualifications and Requirements:

Education/Training:  BS in a Computer Science or related scientific/technical field with ten (10) years’ experience, or equivalent combination of training and experience.

 

Experience:  Experience listed above should include:

  • Work in cyber security or intelligence operations;
  • Prior responsibility managing a team comprising a total of at least 5 individuals with commensurate personnel and financial authority. 
  • These individuals should have had cyber operations roles.

Skills/Abilities: Working knowledge of:

  • Current security challenges and threats faced by a subset of the following audiences: USG intelligence, defense, law enforcement, civilian departments, and critical infrastructure;
  • USG missions areas/owners in cyber security;
  • Community best practices in cyber operations and associated tools/techniques
  • Internet protocols, operations, and governance.

Ability to:

  • Set and implement a strategic direction for a technical group;
  • Codify operational experience into best practices;
  • Conduct technical project management;
  • Brief strategic and technical topics to senior management and non-technical audiences;
  • Sustain a team with business development activity;
  • Foster professional growth and develop technical/professional leadership capabilities in technical staff.

Physical Mobility:  Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Arlington/Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (up to one 2 day trip every week).

Environmental Conditions:  Normal office conditions; close contact with computer display for extended periods of time.

Mental:  The ability to: work meticulously with careful attention to detail; meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort; develop and communicate innovative ideas; and excellent oral and written communication skills.

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: MS in a related technical field with ten (10) years of experience.

Experience:  Experience listed above should include:

  • Working for or supporting the USG;
  • Supporting multiple sponsors/customers;
  • Supporting customers in an operational security environment such as incident response, intelligence, or a security operations center;
  • Supporting elements of the critical infrastructure sectors or international NCSIRTs;
  • Leading community building activities in the critical infrastructure, NCSIRT, or USG space
  • Establishing and defining processes for operational security organizations, and codifying best practices from community and operational experience;
  • Leading workforce/capacity building projects;
  • Prior responsibility in managing a team of 15-20 individuals with commensurate personnel and financial authority;
  • Participation in public and closed community security forums through activities such as publication, presentation, collaborative security operations, and collaborative research.

Skills/Abilities: 

  • Practical experience leading, defining, or applying TTPs for cyber operations;
  • Working knowledge of secure systems and network architecture practices. 

  

Accountability:  This position is accountable for the specification and execution of all any Incident Analysis technical area work plans and a subset of the SEI operational plan.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and NSS, defined policies, practices, and procedures.  Additionally, this position will define those set for their technical area and influence those set for CERT.

Decisions:  The individual in this position is expected to make strategic choices about the direction of the technical area that will be distilled into a technical agenda funded by a defined set of existing or new customers and implemented by a team hired to support the specifics tasking.

Supervisory Responsibilities:  This position has ultimate supervisory responsibility over all staff in the technical areas to include hiring, performance reviews, salary adjustments, task assignment, and setting the tone and culture of the group.

 

Job Functions or Responsibilities:

30%                  Manages group to effectively implement the SEI and task order work plans.  Sets goals and objectives and manages operational and functional business activities.   Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).

30%                  Provides guidance to and monitors the success of team leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility.  Provides oversight of team leads and their supervisory responsibilities of technical staff and conducting performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff.

20%                  Sets technical direction of technical area.  Leads planning process and contribute to the development the CERT strategic plan.  Ensures regular update of technical area’s plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy.  Articulates vision for internal and external audiences.

10%                  Identifies opportunities for new technical projects and manages start-up of new, high-priority technical areas of work. Works with Technical Director of CERT/CC to develop and implement a funding and transition plan for new work areas.

10%                  Directs organizational effectiveness and staff learning and development plans. Identifies operational success measures and process improvements.  Leads corrective action.

100% Total Effort

 

Organizational Chart: Division Director, CERT < CERT/CC Technical Director < CERT CSIRT Operations Technical Manager

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

24 Mar
2015
Cyber Security Engineer - Exercise Developer - 2000687
Arlington, VA

This is located in Arlington, VA

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with five (5) years applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with two (2) years applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

24 Mar
2015
Project Manager - 2000703
Pittsburgh, PA

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems. 

A CERT/CC Project Manager is a member of the CERT/CC Project Office that guides the development and execution of technical projects throughout the lifecycle.  The successful candidate will work closely with PMO Manager to plan and establish organizational project management processes to achieve needs of different departments within the CERT/CC.  The candidate will: develop project management processes and create improvement plans to meet business and project needs, perform administrative and PM duties in the Microsoft Project Server and related Project Site SharePoint environments, and be responsible for the management and completion of projects.  Activities will include oversight of all aspects of projects, setting deadlines, assigning responsibilities, monitoring progress, and producing reports for management.

Responsibilities:

  • CERT/CC Project Office
    • Develop systematic management of projects in alignment with the organization’s strategic business goals
    • Define and implement organizational project management processes and mature existing processes
    • Perform maturity assessments and create improvement plans
    • Develop project management tracking systems
  • Project Management
    • Define and control scope
    • Develop WBS, produce and manage schedule
    • Work with Technical Leads to produce cost estimates, schedules and financial reporting artifacts
    • Assist in managing the activities of non-organic employees and subcontractors who serve on the project team to ensure completion and acceptance of deliverables
    • Coordinate and perform resource allocation and leveling among competing priorities across the organization.
    • Assemble project plans and, in conjunction with the technical lead, direct and monitor the work
    • Resolve or escalate risks related to cost, quality, and schedule
    • Responsible for reporting progress, status, and issues to CERT/CC and government program managers.
  • Project Tools Administrator
    • Support users unfamiliar with tools
    • Perform troubleshooting
    • Backup and restore
    • Manage MSP PWA and Project Site security
    • Perform Time and Task Management
    • Develop custom Business Intelligence reports (SQL)
    • Manage internal project information maintained in Atlassian Confluence, JIRA, and RMsis.

Minimum Qualifications and Requirements:

Education/Training:   MBA or MS in Computer Science, Software Engineering, Information Systems or related field or combination of training and experience.

Licenses:   Project Management Professional (PMP).

Experience:  Designing, developing, or implementing information technology projects for government clients; exceptional interpersonal and technical writing skills; developing organizational project management processes and tools infrastructure. Candidate should have five to seven (5-7) years of project management experience with customer-focused technology projects such as product or service development, research and development or technical transition.

Skills/Abilities:   Working knowledge of Microsoft Project Server; analytical and technical problem-solving skills; possess strong customer service skills; motivated to tackle challenging problems; excellent organizational skills; communicate effectively within a team environment.

Physical Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.

Other:  U.S. Citizenship is required.  Applicants will be subject to a security investigation and must meet eligibility requirements for access to classified information, and must be able to pass a background investigation.  Apllicants must be willing to travel to a customer site in the Washington D.C. / Northern Virginia metro area. Candidate will be required to travel on overnight assignments.

 

Accountability: The Individual is accountable for:  accurately capturing project requirements and managing projects through the lifecycle; working closely with technical project leads and CERT/SEI financial managers to ensure projects are accurately represented, managed and controlled.

Direction:  Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor.

Decisions:  Accurately represents the program and individual projects in interactions with internal branches, customers and sponsors.  The individual is expected to participate in the decision-making and problem-solving processes surrounding building accurate project plans, understanding the SEI financial system and making CERT/CC decisions regarding effort allocations, sub-contract negotiations and purchasing.

Supervisory Responsibilities:  This position may include supervision of one of more Project Administrators.

 

Job Functions and Responsibilities:

30%     Initiating, planning, executing, monitoring/controlling, and coordinating major technical projects and their related activities.

30%     Administer and support users of MS Project and other project management tools.

30%     Develop, implement, and manage organizational project management initiatives.

5%       Contributing to and participating in business development, CERT management, and sponsor meetings.

5%       Develop knowledge and understanding of SEI capabilities; learning how SEI capabilities can be applied to customer problems.

100%      TOTAL EFFORT

 

Organizational Chart:  CERT Division Director < CERT/CC Technical Director < CERT/CC Deputy Technical Director < CERT/CC Project Office Director < CERT/CC Project Manager

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

20 Mar
2015
Cyber Intelligence Analyst - 2000689
Pittsburgh, PA or Arlington, VA

Position SummaryThe CERT Program is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania.  The CERT Threat Analysis group supports government customers by developing cutting-edge, network and threat analysis capabilities and techniques to support intelligence requirements and operational missions in high-impact areas.

The CERT Coordination Center develops analysis techniques for some of the largest networks in the world, and supports a wide range of computer network operations activities across the intelligence, planning, and operations execution lifecycle. The analyst will develop new analysis techniques and finished products focused on defending against emerging threats, support customers’ requirements with novel analytic techniques and reports, and take a lead role in preparing research for publication.  The successful candidate will have some combination of academic training, experience in or supporting the US Intelligence Community or Federal Law Enforcement in addition to applied network security or cyber intelligence experience. The individual will be expected to serve in a lead role for the design, execution, and documentation of one or more tasks, as well as to serve as a liaison with customers, potential customers, vendors, and the Internet community as a whole.

This position can be primarily located in the Arlington, VA or Pittsburgh, PA offices of the SEI.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s Degree in Computer Science, Intelligence Studies, or a related analytic/scientific/technical field with eight (8) years’ experience; Master’s Degree in Computer Science, Intelligence Studies, or a related analytic/scientific/technical field with five (5) years’ experience; PhD in Computer Science, Intelligence Studies, or a related analytic/scientific/technical field with two (2) years’ experience; or equivalent combination of training and experience.

Experience: Professional experience listed above is in network security research and/or cyber intelligence—the successful applicant will likely have both.  Applicants should have a record of significant contribution to the US Intelligence and security community, such as publication or involvement in open source projects. 

Skills/Abilities:

  • Capable of conducting analytical studies and investigations of incident and network security data.

  • Capable of performing original research in security analysis and cyber intelligence.

  • Familiarity and prior experience with US Intelligence Community elements, structure and products.

  • Understanding of advanced threat actors and/or typical techniques, tactics and procedures.

  • Understanding of Intelligence Community standards and directives for analytic tradecraft.

  • Experience with scripting and/or programming in a high level language.

  • Deep understanding of and practical experience with various Internet protocols (e.g., TCP/IP, DNS, SMTP, BGP, TLS).

  • Deep knowledge of at least one modern operating system (e.g., Linux, Solaris, Windows 2000/2003/XP/7).

  • Understanding of network security issues at all protocol layers.

  • Understanding of host/operating system security issues.

  • Familiarity with and deep understanding of: IDS, firewalls, SIM/SEM, network and vulnerability scanning, routing.

  • Ability to set strategic direction and agenda for a diverse group of developers and researchers.

  • Ability to function in the role of a consultant.

  • Planning and organizational skills.

  • Strong problem solving skills.

  • Excellent oral and written communication skills.

  • Ability to work both independently and with teams.

  • Experience with statistics.

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Flexibility to travel to various locations within the SEI and CMU community, including sponsor sites, conferences, and meetings.                                

Environmental Conditions:  Normal office conditions; loose contact with computer display for extended periods of time.

Mental:  Ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; ability to deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort, ability to develop and communicate innovative ideas; ability to take leadership role in technical projects; ability to quickly learn new procedures, techniques, approaches, etc. 

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Experience: Experience working:

  • in a team environment leading collaborative projects with diverse skills and roles;

  • in the public forum of the broader information security community;

  • directly with customers from government and/or industry (multiple critical infrastructure);

  • in exploratory data analysis;

  • in data visualization;

  • in human-computer interface (HCI) design;

  • technical writing.

 

AccountabilityThe individual is accountable for:

  • Active participation in the overall Threat Analysis R&D effort.

  • Producing original publications in network security analysis.

  • Mentoring junior analysts and researchers.

  • Participating in public speaking engagements, including at remote locations.

Direction:  The individual is expected to act independently using CMU, SEI, NSS, and CERT/CC defined policies, practices, and procedures – within the scope of assigned work.

Decisions:  The individual is expected to participate in the decision-making and problem-solving processes of strategic research direction and strategy of transition of research to engineered technology.

Supervisory Responsibilities:  This position does not formally supervise others.  However, the individual will act in a technical leadership (non-supervisory) role in regard to specific work products and activities, or in regard to student interns, etc. 

 

Job Functions or Responsibilities:

70%     Perform and publish original work in network security analysis and cyber intelligence, including work leading to various government and private sector releases. 

10%     Contribute to overall strategic direction for a diverse security and intelligence R&D team 

10%     Mentor and guide junior analysts.

10%     Participate in and/or lead presentations to customers, analyst jam sessions, training sessions and public speaking engagements.  

100% TOTAL EFFORT

 

Organizational Chart:  Manager, Networked Systems Survivability Program > Technical Director, CERT Coordination Center > Technical Manager, CERT/CC Threat Analysis > Team Lead, CERT/CC Threat Intelligence > Network Intelligence Analyst

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

18 Mar
2015
Cyber Security Researcher - 2000672
Pittsburgh, PA or Arlington, VA

Position Summary: The CMU/SEI Forensic Operations and Investigations team is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 10 years, CERT has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, FOI is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

This individual will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. As a member of the FOI team this candidate will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital forensics and applied research in emerging areas of cybercrime. At times, this position will require the team member to develop and deliver training modules related the aforementioned domains.

The successful candidate must have proven computer forensics experience in multi-jurisdiction criminal investigations, be self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and instructional skills. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training: BS Computer Science, Information Security or other related discipline and a minimum of eight (8) years of related experience; or equivalent combination of training and experience.

Licenses: Certified Encase Examiner, ACE. CISSP, GIAC, SSCP, OSCP or other related/relevant certifications preferred.

Experience:  At least four or more (4+) year’s relevant experience in computer forensics, to include field and laboratory collection/imaging, analysis, with prior court room testimony preferred.  Technical experience required with host and network based forensics investigations and tools, analysis of Microsoft Windows, Unix/Linux and Mac OS operating systems, and removable media data recovery.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, have strong analytical and information organization skills, have excellent oral and written communication skills, and strong technical teaching skills.  Candidate must be skilled in instructional design, course development, and evaluation techniques.  Candidate must be able to multi-task and work effectively with multiple project teams and sponsors/customers. Technical proficiency with operating systems and detailed knowledge of network protocols are required.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with CRT for long periods of time.

Mental:  Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: BS in Computer Science, Information Security or other related discipline with a minimum of eight (8) years of applicable experience; MS in Computer Science, Information Security or other related discipline with a minimum of five  (5) years of applicable experience; PhD in Computer Science, Information Security or other related discipline with a minimum of two (2) years of applicable experience; or equivalent combination of training and experience.

Experience: Experience with state or federal law enforcement organization; operational knowledge of recently enacted state and federal laws and procedures relating to computer forensics investigations; coordination with criminal investigators, including courtroom testimony. 

Skills/Abilities:

  • Penetration Testing

  • Information and network security including experience with IDS/IPS

  • Knowledge of common vulnerabilities, exploits and mitigations

  • Digital Forensics (host, network and mobile devices)

  • Incident Response

  • Ability to research and characterize security threats including defining appropriate countermeasures

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis

  • Virtual infrastructure and hypervisors

  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP, TLS, DNS, SMTP, TCP/IP, ICMP, AJAX, JSON, REST

  • 2+ years with a scripting language including SQL, Python, Ruby, JavaScript, Perl, PHP and/or shell scripting

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions:  Required to design, develop, pilot and deliver products.  Required to accurately represent NSS and its technical work in interactions with customers, sponsors, and the public.

Supervision:  Contributes to hiring decisions of program staff; mentors junior staff; supervises student interns.  The experienced candidate may perform project management responsibilities.

 

Job Functions or Responsibilities:

55%     Operational support for SEI customers.

20%     Perform applied research in emerging areas of digital forensics.

15%     Deliver technical and management training to customers.

5%       Mentor, guide and interact with team and other staff.

5%       Contribute to the research and technical agendas of the FOI.       

Organizational Chart:  CERT Division Director, Technical Director, Cyber Security Solutions > Deputy Director, Cyber Security Solutions > Technical Manager, Forensic Operations and Investigations > Cyber Security Researcher

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

18 Mar
2015
Senior Cyber Security Researcher - 2000671
Pittsburgh, PA

Position Summary: The CMU/SEI Forensic Operations and Investigations team is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 10 years, CERT has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, FOI is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

This individual will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. As a member of the FOI team this candidate will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital forensics and applied research in emerging areas of cybercrime. At times, this position will require the team member to develop and deliver training modules related the aforementioned domains.

The successful candidate must have proven computer forensics experience in multi-jurisdiction criminal investigations, be self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and instructional skills. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training: BS Computer Science, Information Security or other related discipline and a minimum of ten (10) years of related experience; or equivalent combination of training and experience.

Licenses: Certified Encase Examiner, ACE. CISSP, GIAC, SSCP, OSCP or other related/relevant certifications preferred.

Experience:  At least four or more (4+) year’s relevant experience in computer forensics, to include field and laboratory collection/imaging, analysis, with prior court room testimony preferred.  Technical experience required with host and network based forensics investigations and tools, analysis of Microsoft Windows, Unix/Linux and Mac OS operating systems, and removable media data recovery.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, have strong analytical and information organization skills, have excellent oral and written communication skills, and strong technical teaching skills.  Candidate must be skilled in instructional design, course development, and evaluation techniques.  Candidate must be able to multi-task and work effectively with multiple project teams and sponsors/customers. Technical proficiency with operating systems and detailed knowledge of network protocols are required.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with CRT for long periods of time.

Mental:  Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: BS in Computer Science, Information Security or other related discipline with a minimum of ten (10) years of applicable experience; MS in Computer Science, Information Security or other related discipline with a minimum of eight (8) years of applicable experience; PhD in Computer Science, Information Security or other related discipline with a minimum of five (5) years of applicable experience; or equivalent combination of training and experience.

Experience: Experience with state or federal law enforcement organization; operational knowledge of recently enacted state and federal laws and procedures relating to computer forensics investigations; coordination with criminal investigators, including courtroom testimony. 

Skills/Abilities:

  • Penetration Testing

  • Information and network security including experience with IDS/IPS

  • Knowledge of common vulnerabilities, exploits and mitigations

  • Digital Forensics (host, network and mobile devices)

  • Incident Response

  • Ability to research and characterize security threats including defining appropriate countermeasures

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis

  • Virtual infrastructure and hypervisors

  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP, TLS, DNS, SMTP, TCP/IP, ICMP, AJAX, JSON, REST

  • 2+ years with a scripting language including SQL, Python, Ruby, JavaScript, Perl, PHP and/or shell scripting

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions:  Required to design, develop, pilot and deliver products.  Required to accurately represent NSS and its technical work in interactions with customers, sponsors, and the public.

Supervision:  Contributes to hiring decisions of program staff; mentors junior staff; supervises student interns.  The experienced candidate may perform project management responsibilities.

 

Job Functions or Responsibilities:

55%     Operational support for SEI customers.

20%     Perform applied research in emerging areas of digital forensics.

15%     Deliver technical and management training to customers.

5%       Mentor, guide and interact with team and other staff.

5%       Contribute to the research and technical agendas of the FOI. 

 

Organizational Chart:  CERT Division Director, Technical Director, Cyber Security Solutions > Deputy Director, Cyber Security Solutions > Technical Manager, Forensic Operations and Investigations > Senior Cyber Security Researcher

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

18 Mar
2015
Associate Cyber Security Researcher - 2000670
Pittsburgh, PA

Position Summary: The CMU/SEI Forensic Operations and Investigations team is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 10 years, CERT has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, FOI is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

This individual will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. As a member of the FOI team this candidate will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital forensics and applied research in emerging areas of cybercrime. At times, this position will require the team member to develop and deliver training modules related the aforementioned domains.

The successful candidate must have proven computer forensics experience in multi-jurisdiction criminal investigations, be self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and instructional skills. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training: BS Computer Science, Information Security or other related discipline and a minimum of three (3) years of related experience, or equivalent combination of traning and experience.

Licenses: Certified Encase Examiner, ACE. CISSP, GIAC, SSCP, OSCP or other related/relevant certifications preferred.

Experience:  At least four or more (4+) year’s relevant experience in computer forensics, to include field and laboratory collection/imaging, analysis, with prior court room testimony preferred.  Technical experience required with host and network based forensics investigations and tools, analysis of Microsoft Windows, Unix/Linux and Mac OS operating systems, and removable media data recovery.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, have strong analytical and information organization skills, have excellent oral and written communication skills, and strong technical teaching skills.  Candidate must be skilled in instructional design, course development, and evaluation techniques.  Candidate must be able to multi-task and work effectively with multiple project teams and sponsors/customers. Technical proficiency with operating systems and detailed knowledge of network protocols are required.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with CRT for long periods of time.

Mental:  Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: BS in Computer Science, Information Security or other related discipline with a minimum of three (3) years of applicable experience; MS in Computer Science, Information Security or other related discipline with a minimum of one (1) year of applicable experience; or equivalent combination of training and experience.

Experience: Experience with state or federal law enforcement organization; operational knowledge of recently enacted state and federal laws and procedures relating to computer forensics investigations; coordination with criminal investigators, including courtroom testimony. 

Skills/Abilities:

  • Penetration Testing

  • Information and network security including experience with IDS/IPS

  • Knowledge of common vulnerabilities, exploits and mitigations

  • Digital Forensics (host, network and mobile devices)

  • Incident Response

  • Ability to research and characterize security threats including defining appropriate countermeasures

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis

  • Virtual infrastructure and hypervisors

  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP, TLS, DNS, SMTP, TCP/IP, ICMP, AJAX, JSON, REST

  • 2+ years with a scripting language including SQL, Python, Ruby, JavaScript, Perl, PHP and/or shell scripting

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions:  Required to design, develop, pilot and deliver products.  Required to accurately represent NSS and its technical work in interactions with customers, sponsors, and the public.

Supervision:  Contributes to hiring decisions of program staff; mentors junior staff; supervises student interns.  The experienced candidate may perform project management responsibilities.

 

Job Functions or Responsibilities:

55%     Operational support for SEI customers.

20%     Perform applied research in emerging areas of digital forensics.

15%     Deliver technical and management training to customers.

5%       Mentor, guide and interact with team and other staff.

5%       Contribute to the research and technical agendas of the FOI.                   

100%      Total Effort

 

Organizational Chart:  Director, CERT Program < Technical Manager, FOI < Cyber Security Researcher

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

20 Feb
2015
Cyber Security Engineer - Penetration Tester - 2000574
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with three (3) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as a penetration tester, system or network administrator, information systems auditor, software engineer, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

  • Popular penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap)

  • Knowledge of common networking protocols and services

  • Basic knowledge of exploit development and application fuzzing

  • Windows and Linux Operating System environments, networking devices, and common database platforms

  • Cyber security, survivability, and resilience concepts and issues

  • Software and systems engineering

  • Building and maintaining customer relationships

  • Data analytics and quantitative measures

  • Strategic Planning and requirements definition

  • Process improvement

  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, penetration testing, and telecommunications systems

  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards

  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues

  • Working knowledge of the DoD and Agency resilience needs and cyber security roadmaps

  • Development and delivery of information and infrastructure security risk and vulnerability evaluations

  • Ability to conduct analytical studies and investigations

  • Reasoning and problem-solving skills

  • Ability to work independently with limited supervision

  • Ability to interact effectively with diverse constituencies internally and externally

  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure

  • Ability to recognize and deal appropriately with confidential and sensitive information

  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks

  • Leadership and mentoring skills

  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations

  • Ability to work on customer sites with high-ranking members of the Federal Government and US

  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA),

Experience: 

  • Expert proficiency with a variety of technical vulnerability analysis tools
  • Advanced penetration testing experience
  • Software development experience and advanced exploit development

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in risk and vulnerability assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and penetration testing; transition research into applied knowledge for customers.

10% Deliver courses on offensive security tools and tactics and penetration testing management.

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                     

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

22 Jan
2015
Threat Analyst - 2000396
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, PA.  The CERT Threat Analysis group is an applied research and development group that provides strategic threat analysis, conducts quantitative studies of large-scale USG networks and builds prototype tools in support of operational sponsors.  This group has diverse expertise to include security analysts, network engineers, malware analysts, statisticians, and developers in the Pittsburgh and Washington DC area.  The position of Threat Analyst is responsible for performing in-depth analysis of cyber threat data to include: identification of active security threats, development of new analytic methods, reverse engineering of malicious code, and documenting and transitioning results in reports, presentations, and technical exchanges.

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s Degree in Computer Science or scientific/technical field with theight (8) years’ experience; MS/MA in a scientific or technical field with five (5) year of experience; or equivalent combination of training and experience.

Experience: 

·         Experience in analyzing cyber threat data

·         Experience in development of analysis techniques

·         Knowledge of static and dynamic code analysis techniques and tools, to include existing gap areas

Skills/Abilities: The ability to:

·         Reverse engineer malicious code

·         Develop code in Python or Java

·         Communicate complex designs or plans to sponsors, project managers and technical staff in clear concise language tailored to the audience

·         Meet deadlines while working on multiple tasks often with shifting priorities

·         Deal collaboratively and successfully with customers, co-workers and other professional colleagues, managers, and staff

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (2-3 trips a month).

Environmental Conditions:  Normal office conditions; close contact with computer display for extended periods of time.

Mental:  The ability to:

·         Work meticulously with careful attention to detail

·         Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

·         Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

·         Ability to grasp the big picture, direction, and goals of an effort

·         Develop and communicate innovative ideas

·         Excellent oral and written communication skills

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: MS/MA in a scientific, technical, or business field with five (5) year of experience. PhD in a technical field with two (2) years of experience.

Experience: 

·         Experience on an incident response; intelligence or security operations floor

·         Participation in broad public forums through activities such as standards, open source development, or publication

·         Experience publishing research and academic papers

·         Experience working with the government, or within a critical infrastructure sector.

·         Expertise in Cyber intelligence tradecraft

·         Knowledge of current challenges and threats faced by USG network security and intelligence organizations

Skills/Abilities: 

·         Knowledge of multiple modern operating systems

·         Strong background with mathematical programming and visual analysis systems

·         Knowledge of USG networks, policies and missions areas/owners in cyber security

·         Knowledge of Internet protocols, operations, and governance

 

Accountability:  This position is accountable for ensuring that the Threat Analysis technical area delivers on the execution of the statement of work for a specific customer.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and NSS, defined policies, practices, and procedures.  Additionally, this position will assist in setting Threat Analysis direction based on an understanding of customer needs.

Decisions:  The individual in this position is expected to participate in the decision-making and problem solving process of designing, building and operating systems for network security; suggesting and implementing policies and procedures to support these activities; and creating prototyping implementations of tools and approaches for threat analysis.

Supervisory Responsibilities:  This position does not supervise others.

 

Job Functions or Responsibilities:

30%      Design, prototype, and transition new analysis methods and tools.

30%      Identify and document high-impact, emerging, and complex active security threats.

30%      Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges.                     

10%      Participate in and/or lead presentations to customers, analyst technical exchanges, training sessions and public speaking engagements.

100% Total Effort

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

22 Jan
2015
Senior Analyst - 2000395
Pittsburgh, PA

Position Summary:  The CERT Program is a division of the Software Engineering Institute, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania.  The Situational Awareness branch within the CERT Coordination Center supports government customers by developing cutting-edge network sensing and analysis tools for operational use in high-impact environments.

The successful candidate will provide technical leadership for a significant portion of cutting-edge applied research and development in computer security.  Challenge problems include strategic large-scale network analysis, quantitative measurements of large-scale US Government networks, development of situational awareness metrics for decision support, deployment and calibration of global sensor grids, and the effective transition of analytic solutions. 

As a senior member of the staff, the individual will be expected to serve as technical lead for the overall design, execution, and documentation of one or more tasks, as well as to serve as a liaison with customers, potential customers, vendors, and the Internet community as a whole.

 

Minimum Qualifications and Requirements:

Education/Training: Master’s Degree in Computer Science or scientific/technical field with eight (8) years’ experience.

Experience

  • Five or more years of professional experience in a technical leadership role which involves network or computer related problem solving

  • A thorough hands-on understanding of current computing platforms and networking protocols

  • In-depth familiarity with current trends in both network security operations and network security research

  • Extensive experience in at least one security or network engineering discipline such as incident handling, network traffic analysis, statistical network analysis, forensics, vulnerability assessment, network auditing, capacity planning or network architecture design

Skills/Abilities:

  • Proven experience applying the principles of discrete mathematics to solve operational problems

  • Theoretical and practical knowledge of network protocols

  • Familiarity with Internet governance and large scale network operations

  • An understanding of the current state of the practice for network analysis techniques, toolsets, and challenge areas

  • Knowledge of modern operating systems

  • The ability to write computational scripts in one or more programming languages such as Python, Perl or Java

  • Strong problem solving skills

  • Technical project management skills

  • Technical writing and reviewing skills

  • Ability to brief technical topics to non-technical senior managers and decision makers

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Flexibility to travel to various locations within the SEI and CMU community, including sponsor sites, conferences, and meetings.                                   

Environmental Conditions:  Normal office conditions; loose contact with computer display for extended periods of time.

Mental:  The ability to:

  • envision operational application of fundamental and applied research ideas

  • work meticulously with careful attention to detail

  • meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • grasp the big picture, direction, and goals of an effort

  • develop and communicate innovative ideas

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training:  Ph.D. in Mathematics, Computer Science or a related scientific or technical field with five (5) years’ experience.

Experience

  • In-depth experience contributing to the public body of knowledge for any of the following related disciplines:

  • Operational research

  • Network flow

  • Telecommunications planning

  • Statistical analysis of computer behaviors

  • Modelling, simulation and emulation

  • Technical writing skills

  • Knowledge of US Government networks

 

Accountability: The individual is accountable for

  • Active participation in the overall CERT/CC R&D effort

  • Producing original publications in network security analysis

  • Mentoring junior analysts and researchers and/or sustaining the vision for research in a specific problem domain

  • Participating in public speaking engagements, including at remote locations

Direction: The individual in this position is expected to act autonomously using CMU, SEI, and CERT, defined policies, practices, and procedures.

Decisions: The individual in this position is expected to participate in the decision-making and problem solving process of designing, building and operating systems for network security; suggesting and implementing policies and procedures to support these activities; and creating prototyping implementations of tools and approaches for situational awareness.  Further, this position will contribute to key design making for the prioritization of efforts for a specific customer.

Supervisory Responsibilities:  This position does not formally supervise others.  However, the individual will act in a technical leadership or mentoring (non-supervisory) role in regard to a specific body of work.

 

Job Functions or Responsibilities:

60%      Lead, perform and publish original work in network security analysis, including work leading to publications.

10%      Contribute to overall strategic direction for a diverse security R&D team.

20%      Mentor and guide junior network security analysts.

10%      Participate in and/or lead presentations to customers, colleague training sessions, conference presentations or public speaking engagements.

100% Total Effort

 

Organizational Chart: Technical Director, CERT Coordination Center > Technical Manager, Situational Awareness > Security Analyst

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

22 Jan
2015
Engagement Lead/Senior Analyst - 2000385
Arlington, VA

Position Summary: The CERT Program is a division of the Software Engineering Institute, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania.  The Situational Awareness branch within the CERT Coordination Center supports government customers by developing cutting-edge network sensing and analysis tools for operational use in high-impact environments.

The successful candidate will provide technical leadership for a significant portion of cutting-edge applied research and development in computer security.  Challenge problems include strategic large-scale network analysis, quantitative measurements of large-scale US Government networks, development of situational awareness metrics for decision support, deployment and calibration of global sensor grids, and the effective transition of analytic solutions. 

As a senior member of the staff, the individual will be expected to serve as the primary interface with our sponsors for the overall execution of a significant area of work.  This includes serving as a liaison with customers, potential customers, vendors, and the Internet community as a whole.

 

Minimum Qualifications and Requirements:

Education/Training: Master’s Degree in Computer Science or scientific/technical field with eight (8) years’ experience.

Experience: 

  • Five or more (5+) years of professional experience in a technical leadership role which involves network or computer related problem solving

  • A thorough hands-on understanding of current computing platforms and networking protocols

  • In-depth familiarity with current trends in both network security operations and network security research

  • Extensive experience in at least one security or network engineering discipline such as incident handling, network traffic analysis, statistical network analysis, forensics, vulnerability assessment, network auditing, capacity planning or network architecture design

Skills/Abilities:

  • Proven experience applying the principles of discrete mathematics to solve operational problems

  • Theoretical and practical knowledge of network protocols

  • Familiarity with Internet governance and large scale network operations

  • An understanding of the current state of the practice for network analysis techniques, toolsets, and challenge areas

  • Knowledge of modern operating systems

  • Strong problem solving skills

  • Technical project management skills

  • Technical writing and reviewing skills

  • Ability to brief technical topics to non-technical senior managers and decision makers

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Flexibility to travel to various locations within the SEI and CMU community, including sponsor sites, conferences, and meetings.

Environmental Conditions:  Normal office conditions; loose contact with computer display for extended periods of time.

Mental: The ability to:

  • Envision operational application of fundamental and applied research ideas

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Grasp the big picture, direction, and goals of an effort

  • Develop and communicate innovative ideas

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training:  Ph.D. in Mathematics, Computer Science or a related scientific or technical field with five (5) years’ experience.

Experience:

  • In-depth experience contributing to the public body of knowledge for any of the following related disciplines:

    • Operational research

    • Network flow

    • Telecommunications planning

    • Statistical analysis of computer behaviors

    • Modelling, simulation and emulation

  • Technical writing skills

  • Knowledge of US Government networks

 

Accountability:The individual is accountable for

  • Active participation in the overall CERT/CC R&D effort

  • Producing original publications in network security analysis

  • Mentoring junior analysts and researchers and/or sustaining the vision for research in a specific problem domain

  • Participating in public speaking engagements, including at remote locations

Direction: The individual in this position is expected to act autonomously using CMU, SEI, and CERT, defined policies, practices, and procedures.

Decisions: The individual in this position is expected to participate in the decision-making and problem solving process of designing, building and operating systems for network security; suggesting and implementing policies and procedures to support these activities; and creating prototyping implementations of tools and approaches for situational awareness.  Further, this position will contribute to key design making for the prioritization of efforts for a specific customer.

Supervisory Responsibilities: This position does not formally supervise others.  However, the individual will act in a technical leadership or mentoring (non-supervisory) role in regard to a specific body of work.

 

Job Functions or Responsibilities:

30%      Interact with sponsors to understand challenge areas and transition SEI solutions to solve problem.

30%      Lead SEI analysts and engineers in addressing challenge areas for sponsors.

20%      Contribute to overall strategic direction for a diverse security R&D team.

20%      Participate in and/or lead presentations to colleagues, at conferences or through other public speaking engagements.

100% Total Effort

 

Organizational Chart: Technical Director, CERT Coordination Center > Technical Manager, Situational Awareness > Engagement Lead/Senior Analyst

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

26 Nov
2014
Senior Threat Analyst - 101240
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Description:  The CERT program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, PA.  The CERT Threat Analysis group is an applied research and development group that provides strategic threat analysis, conducts quantitative studies of large-scale USG networks and builds prototype tools in support of operational sponsors.  This group has diverse expertise to include security analysts, network engineers, malware analysts, statisticians, and developers in the Pittsburgh and Washington DC area.  The position of Threat Analyst is responsible for performing in-depth analysis of cyber threat data to include: identification of active security threats, development of new analytic methods, reverse engineering of malicious code, and documenting and transitioning results in reports, presentations, and technical exchanges.

Minimum Qualifications and Requirements:

Education/Training:  MS/MA in Computer Science or scientific/technical field with eight (8) years’ experience; PhD in a technical field with five (5) years’ experience; or equivalent combination of training and experience.

Experience: 

·         Experience in analyzing cyber threat data

·         Experience in development of analysis techniques

·         Knowledge of static and dynamic code analysis techniques and tools, to include existing gap areas

·         Experience publishing research and academic papers

 Skills/Abilities:  The ability to:

·         Reverse engineer malicious code

·         Develop code in Python or Java

·         Communicate complex designs or plans to sponsors, project managers and technical staff in clear concise language tailored to the audience

·         Meet deadlines while working on multiple tasks often with shifting priorities

·         Deal collaboratively and successfully with customers, co-workers and other professional colleagues, managers, and staff

·         Knowledge of USG networks, policies and missions areas/owners in cyber security

·         Knowledge of Internet protocols, operations, and governance

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (2-3 trips a month).

Environmental Conditions:  Normal office conditions; close contact with computer display for extended periods of time.

Mental:  The ability to:

·         Work meticulously with careful attention to detail

·         Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

·         Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

·         Ability to grasp the big picture, direction, and goals of an effort

·         Develop and communicate innovative ideas

·         Excellent oral and written communication skills

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: MS/MA in a scientific, technical, or business field with ten (10) years’ experience, or equivalent; PhD in a technical field with six (6) years’ experience.

 Experience: 

·         Experience on an incident response; intelligence or security operations floor

·         Participation in broad public forums through activities such as standards, open source development, or publication

·         Experience working with the government, or within a critical infrastructure sector

·         Expertise in Cyber intelligence tradecraft

·         Knowledge of current challenges and threats faced by USG network security and intelligence organizations

Skills/Abilities: 

·         Knowledge of multiple modern operating systems

·         Strong background with mathematical programming and visual analysis systems

·         Working knowledge of all of the following technologies: code analysis tools (e.g., IDA Pro, OllyDbg, WinDBG), run-time environments, virtual machines, relational databases, anti-virus systems, secure systems and network architecture practices, intrusion detection systems and passive DNS

 

Accountability:  This position is accountable for ensuring that the Threat Analysis technical area delivers on the execution of the statement of work for a specific customer.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and NSS, defined policies, practices, and procedures.  Additionally, this position will assist in setting Threat Analysis direction based on an understanding of customer needs.

Decisions:  The individual in this position is expected to participate in the decision-making and problem solving process of designing, building and operating systems for network security; suggesting and implementing policies and procedures to support these activities; and creating prototyping implementations of tools and approaches for threat analysis.

Supervisory Responsibilities:  This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:

30%      Design, prototype, and transition new analysis methods and tools.

30%      Identify and document high-impact, emerging, and complex active security threats.

30%      Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges.                   

10%      Participate in and/or lead presentations to customers, analyst technical exchanges, training sessions and public speaking engagements.

100% Total Effort

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

24 Oct
2014
Vulnerability Analyst - 101175
Pittsburgh, PA

Position Summary:  This is an entry level position that is responsible for acting as the primary coordinator for all software vulnerabilities reported to the CERT Vulnerability Analysis team. CERT receives vulnerability reports through a variety of sources, mainly from the Vulnerability Reporting Form (VRF) on the cert.org website and direct correspondence from researchers, usually through the @cert.org email address. The individual will lead customer, vendor, and reporter coordination, and will write vulnerability reports to be published in the CERT website. These vulnerability notes will include detailed technical descriptions of a given vulnerability in addition to any mitigation recommendations. This individual will also be responsible for software vulnerability analysis including black box testing, source code examination, and attack reproduction. The individual in this position must be self-motivated and will have the opportunity to serve as a strong contributor in the analysis, coordination, and remediation of software vulnerabilities.  

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s degree in Computer Science or related field, or equivalent in education and Minimum of three (3) years’ experience' or Master's degree in Computer Science or related field with one (1) year experience or combination of experience and training.

Experience: This is an entry level position that provides an opportunity for an individual with the educational background and interest to gain experience in the field of computer security.  The individual in this position should have the interest or classroom experience studying system or network administration, software development, database administration, or similarly technical areas. Candidates should have experience in a Windows and Unix/Linux environment and be able to demonstrate substantial knowledge of at least four of the following: various internet protocols (e.g., TCP/IP, DNS, BGP, SMTP, HTTP); computer system and Internet security issues; various security technologies (e.g., encryption, firewalls, and anti-virus products); software runtime analysis, debugging, and security testing techniques; security auditing practices; underlying software defects that routinely result in security vulnerabilities (e.g., input validation errors); understanding of intruder techniques and software exploitation methods; system, database, and/or network administration; operational details of multiple operating systems; cryptographic principles and common cryptographic protocols; one or more programming languages (e.g., C/C++, Perl, or Java); vulnerability management concepts and tools.

Skills/Abilities: Successful candidates will: have an interest in and have extensive knowledge of network and computer security issues; have the ability to analyze software to discover vulnerabilities; be able to develop and explain technical decisions; be able to separate fact from opinion and speculation; have excellent work prioritization, planning, and organizational skills; interact effectively with vulnerability reporters, system and network administrators, vendors, experts, Internet users, sponsors, policy makers, news reporters, managers and staff (i.e., stakeholders in the vulnerability disclosure process); be able to work with closely coordinated team during emergencies; excellent analytical, reasoning, and creative problem solving skills; excellent written, oral communication skills; recognize and deal appropriately with confidential and sensitive information; be able to work meticulously with careful attention to detail; be able to collaborate effectively and work closely within a coordinated team environment; be able to quickly learn new procedures, techniques, and approaches; maintain composure while dealing with difficult people; communicate and work effectively under normal and stressful situations; meet inflexible deadlines; possess strong leadership and mentoring abilities; be motivated to tackle challenging problems.

Physical Mobility: Sedentary.

Environmental Conditions: Close contact with computer displays for prolonged periods.

Mental: Ability to work under pressure; work concurrently on multiple programs in different stages, pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Experience:  Ideal candidates will have substantial experience in two or more of the following areas: industrial/process control systems; web application development; computer and network architecture; reverse engineering; software development; computer and network architecture; network security and survivability issues, to include knowledge of and experience with information security concepts, information security best practices and bodies of knowledge, computer security incident response management.


Accountability: This position is accountable for:  Coordinating all software vulnerabilities reported to the CERT Vulnerability Analysis team; leading customer, vendor, and reporter coordination; producing vulnerability reports to be published.

Direction: Expected to perform under general supervision. Most normal duties and responsibilities are handled independently with the use of established research protocol and departmental and university procedures and policies. Difficult or unique situations are referred to the supervisor.

Decisions: Suggests possible solutions to colleagues and users.

Supervisory Responsibilities: This position does not supervise others.


JOB FUNCTIONS OR RESPONSIBILITIES:

40% Analyzes incoming vulnerability reports to determine technical validity and merit. Coordinates response strategy with affected vendors. Publishes corresponding vulnerability notes.

40% Performs vulnerability discovery and validation using in-house CERT fuzzing tools.

10% Attends required meetings and participates in various seminars and training classes to maintain or update skills needed.

5% Submits regular work progress reports to supervisor.

5%Performs related duties as assigned.

100% TOTAL EFFORT


ORGANIZATIONAL CHART:  CERT Director->CERT/CC Technical Director->Vulnerability Analysis Technical Manager->Vulnerability Analysis Team Lead->Vulnerability Analyst

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

23 Oct
2014
Senior Engineer - Team Lead, Trends - 101171
Pittsburgh, PA

Position Summary:  The CERT program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, PA.  The CERT Threat Analysis group is an applied research and development group that provides strategic threat analysis, conducts quantitative studies of large-scale USG networks and builds prototype tools in support of operational sponsors.  This group has diverse expertise to include security analysts, network engineers, malware analysts, statisticians, and developers in the Pittsburgh and Washington DC-area.  The position of Trends team lead is responsible for leading a team that develops new analytical tradecraft to understand cyber threats, actors, and targets, and as directed by a customer, and apply these techniques to author reports on topics of interest.  The candidate will be responsible for setting the strategic direction of the team, and driving the associated research plan.  Additionally, the candidate will work with the technical manager and peer team leads to ensure resources are properly aligned with the needs of sponsors.  

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s Degree in Computer Science or scientific/technical field with ten (10) years of experience; MS/MA in a scientific or technical field with eight (8) years of experience; or equivalent combination of training and experience.

Experience:

  • Professional experience should include 4 or more years of experience in a leadership role including technical decision-making.

  • Experience listed above should have some relation to security operations or research.

  • Applicants should have a record of significant contributions to the security community, such as academic publication or involvement in open source security tool projects.

  • Expertise in one or more major security or network engineering areas: incident handling, network traffic analysis, forensics, vulnerability assessment, network auditing, capacity planning, network architecture, etc.

  • Knowledge of static and dynamic code analysis techniques and tools, to include existing gap areas.

  • Expertise in Cyber intelligence tradecraft.

  • Knowledge of current challenges and threats faced by USG network security and intelligence organizations.

Skills/Abilities:

The ability to:

  • Envision operational application of fundamental and applied research ideas;

  • Elicit technical requirements and direct capability development based on collaborate with executive, non-technical, or domain-expert stakeholders;

  • Communicate complex designs or plans to executive staff, sponsors, project managers and technical staff in clear concise language tailored to the audience;

  • Meet deadlines while working on multiple tasks often with shifting priorities; and

  • Deal collaboratively and successfully with customers, co-workers and other professional colleagues, managers, and staff.

  • Contribute to business development to sustain the team

  • Technical project management

  • Strong problem solving skills

  • Ability to brief strategic and technical topics to senior management and non-technical audiences

  • Ability to function in the role of a consultant and project manager

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (2-3 trips a month).

Environmental Conditions:  Normal office conditions; close contact with computer display for extended periods of time.

Mental:  

The ability to:

  • Work meticulously with careful attention to detail;

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities;

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff;

  • Ability to grasp the big picture, direction, and goals of an effort;

  • Develop and communicate innovative ideas;

  • Excellent oral and written communication skills.

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: PhD in a technical field with five (5) years of experience, or equivalent combination of training and experience.

Experience:

  • Prior responsibility in managing a body of work consisting of numerous large scale projects and multiple customers/external sponsors.

  • Experience on an incident response; intelligence or security operations floor.

  • Participation in broad public forums through activities such as standards, open source development, or publication.

  • Experience publishing research and academic papers.

  • Experience working with the government, or within a critical infrastructure sector.

Skills/Abilities

  • Knowledge of multiple modern operating systems

  • Strong background with mathematical programming and visual analysis systems

  • Knowledge of USG networks, policies and missions areas/owners in cyber security

  • Knowledge of Internet protocols, operations, and governance

 

Accountability:  This position is accountable for ensuring that the Threat Intelligence team delivers on the execution of the statement of work for a specific customer.  The individual is accountable for aligning Threat Intelligence projects with customer needs and re-prioritizing efforts as appropriate.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and NSS, defined policies, practices, and procedures.  Additionally, this position will assist in setting NetSA direction based on an understanding of customer needs.

Decisions: The individual in this position is expected to participate in the decision-making and problem solving process of designing, building and operating systems for network security; suggesting and implementing policies and procedures to support these activities; and creating prototyping implementations of tools and approaches for situational awareness.  Further, this position will contribute to key design making for the prioritization of efforts for a specific customer.

Supervisory Responsibilities:  This position does not formally supervise others.  However, the individual will act in a technical and project leadership role with respect to specific work products and a specific customer.  Further, they will lead activities at both CMU and at the customer site.

 

Job Functions or Responsibilities:

40%      Supervise a team within a defined set projects.  Assign tasking and set priorities based on changing needs.

30%      Lead, perform and publish original work contributing the advancement of tradecraft in threat intelligence.

20%      Enable the transition and appropriate focus of Threat Analysis approaches and tools into operational environments.                       

10%      Participate in and/or lead presentations to customers, analyst technical exchanges, training sessions and public speaking engagements.

100% TOTAL EFFORT

 

Organizational Chart:  Division Director, CERT > Technical Director, CTVA > Threat Analysis Technical Manager > Trends Team Lead

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

03 Sep
2014
Information Security Researcher - 101049
Pittsburgh, PA

Position SummaryThe CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures. The individual will conduct applied research and perform assessments, diagnostics, and analysis techniques to better understand and mitigate risks to cyber environments and the organizational processes that depend on them. Activities will include close work with customers from a variety of organizations, including DoD, government agencies, and commercial organizations.

 

Minimum Qualifications and Requirements:

Education/Training:  PhD in computer science, software engineering, information systems, or a related scientific/technical field with five (5) years’ experience, or equivalent combination of training and experience.

Licenses:  CISSP, CISM or CISA.

Experience:  Experience with and applied knowledge in:  information technology and telecommunications systems; cyber security, survivability, and resilience concepts and issues; software and systems engineering; work with Federal Government.  Experience as a principal investigator or technical lead for research, development, or transition projects.  Published academic quality research or other broadly disseminated technical artifacts (books, software, etc.)

Skills/Abilities: Must exhibit the following skills and abilities:  understanding of information technology and telecommunications systems; working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards; development and delivery of information and infrastructure security risk and vulnerability evaluations; ability to conduct analytical studies and investigations; reasoning and problem-solving skills; ability to work independently with limited supervision; ability to interact effectively with customer and to represent the SEI and its capabilities; ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure; ability to recognize and deal appropriately with confidential and sensitive information; ability to implement project plans, monitor project budgets, and identify and mitigate project risks; leadership and mentoring skills;  excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations; participation in professional society activities, particularly IEEE and ACM; strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development.

Physical/Mobility: Primarily sedentary in an office setting with some mobility.  Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:  take or share leadership role in technical projects; work meticulously with careful attention to detail; meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to understand the big picture, direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Licenses:  CISSP, CISM, GIAC, CISSP, OSCP or similar.

Experience:  Principal investigator for government funded research.

Skills/Abilities:  Ability to lead work teams as needed, consulting skills, ability to deliver coursework and training, ability to develop and foster external research collaborations.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision.  The individual must accurately represent the program in interactions with customers, sponsors, and the public.  The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

30%      Participate in the delivery of existing CERT cyber security, resilience, and risk assessment and analysis approaches with customers and partners; participate in research, analysis, and documentation of cyber security issues, concerns, and risks at customer locations.

25%      Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and resilience; transition research into applied knowledge for customers.

10%      Contribute to conferences and meetings; participate in business development calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

10%      Contribute to, publish technical notes and reports, and review the literature in cyber security, technical assessment, resilience, and software engineering.

10%       Provide assistance and input to other teams and projects within the SEI.

SECONDARY FUNCTIONS

5%       Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%       Contribute to and review the literature in cyber security, resilience, and software engineering.

5%       Provide assistance and input to other teams and projects within the SEI.

100% TOTAL EFFORT

 

Organizational ChartDirector, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Security Assurance Team < Information Security Researcher

 

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

30 Jul
2014
Senior Cyber Security Engineer - 100973
Pittsburgh, PA

Position Summary:  The CMU/SEI Cyber Security Solutions (CS2) directorate is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 8 years, the CS2 Forensic Operations and Investigations group has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the CS2/FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, DIID is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

The individual in this position will work as a member of the CERT Program’s Cyber Security Solutions (CS2) directorate as a member of the Forensic Operations and Investigations (FOI) group. The candidate will be expected to perform a variety of roles. Primary to this position is the management of an existing portfolio of operational clientele as well as the expansion of the FOI portfolio of work within the Defense and Intelligence communities. To achieve this, the candidate will be expected to understand the unique needs of these communities in order to develop a strategic program of research, development and analysis to support current and future gaps in key areas of need. This position will be directly responsible for developing new and maintaining existing customer relationships through ongoing interaction with customers.

Minimum Qualifications and Requirements:

Education/Training:  Bachelors of Science in Computer Science, Intelligence or Intelligence Analysis, Network Security, or related field with more than ten (10) years’ experience, Masters of Science in same fields with more than eight (8) years’ experience, Doctorate in same fields with more than five (5) years’ experience or equivalent.

Experience:  Professional experience listed above to include the following areas: Cyber and Intelligence analysis, preferably within company security teams, network operations centers, counter terrorism centers, or within the government in counter cyber threat environments; intelligence community knowledge and experience; awareness of sourcing, intelligence analysis methodologies, intelligence needs, cyber capabilities, and intelligence tools; leader of teams of analysts, operators, and technologist, preferably in the areas of security or intelligence; experience with and oversight of intelligence analysis and reporting operations; experience using and awareness of data analytics.

Skills/Abilities: Knowledge of and experience in: Familiarity with mission needs and challenges in “cyber”; awareness of intelligence capabilities in support of US Government (Department of Defense and the Intelligence Community) cyber missions, including gaps and capability needs; experience and knowledge of cyber threats and cyber threat analytics; intimate knowledge of key government stakeholders in cyber and knowledge of relevant industry organizations and activities related to cyber; information assurance/survivability; data analytics; effective leadership skills to create informal but effective teams in partnerships across the U.S.; team leadership; leadership of skill-diverse, multidisciplinary teams; strong written and verbal communications skills and the ability to present to small and large audiences; intelligence community and service cyber commands domain knowledge a plus.

Physical Mobility: Primarily sedentary in an office setting with some mobility. Flexible to travel to various locations within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Travel outside of Pittsburgh limited to one-two weeks a month.

Environmental Conditions: Normal office conditions; close contact with computer screen for extended periods of time.

Mental: The ability to: Oversee and direct the design and development of detailed analysis methodologies and processes based on requirements elicitation from internal and external stakeholders; lead the interaction and clearly communicate with cyber intelligence and security staff across government and industry, software developers, IT infrastructure owners and architects, analyst, and non-technical experts; work meticulously with attention to detail; lead multiple projects and project teams at once; delegation; lead and manage under uncertainty; gradual structure projects and programs based on dynamic requirements and incremental input and evaluation; flexibility; drive teams to effectively meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers, and other professional colleagues, managers, and staff; grasp and shape the big picture, direction, and goals of an effort while focusing on the meaning of details and how they are to be achieved; interface with world-class researchers across government, industry, and academia; develop and communicate innovative ideas; quickly learn and develop new procedures, techniques, and approaches.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Accountability:  This position will be responsible for leading technical teams, developing approaches and solutions to digital intelligence problems for and with government, industry, and academic partners.

Direction: This position is expected to act with limited supervision in accordance with SEI procedures and policies, such as those involving technical leadership, analysis, report production, and confidentiality. This position requires close collaboration and teaming with the CS2/FOI Technical Management teams and program staff.

Decisions:  This position will be in a decision-making capacity for technical aspects of FOI projects and programs. Close coordination with the FOI technical manager will be required.

Supervisory Responsibilities:  This position will likely hold supervisory responsibilities for small (2) to medium (10) sized teams.

 

Job Functions or Responsibilities:

55%     Serve as a technical leader for CS2/FOI projects and programs, including the development of capabilities. Lead technology demonstration and intelligence activities across the Forensic Operations and Investigations (FOI) portfolio. Oversee and direct the aggregation and analysis of industry and contextual data to understand, capture, and report on events related to global, national, and local threat intelligence and network intelligence. Collaborate with, direct, and mentor other SEI staff, including analysts, technologist, researchers, and others.

25%     Explore, design, identify, document, guide the development of, and evaluate solutions to critical government and industry cyber intelligence issues.  Interface and collaborate with government and industry experts, the research community, and academics to identify needs, capabilities, objectives, and possible solutions to key digital intelligence challenges.

15%     Work with and advise the CS2/FOI management, and other senior leaders at the SEI on strategy, business development, direction, planning, and execution.

5%    Participate in the broader SEI software research community through collaboration, papers, and presentations.

100% Total Effort

 

Organizational Chart:  CERT Director > CS2 Technical Director > CS2 Deputy Director > Forensic Operations and Intelligence Technical Manager > Senior Engineer – Defense and Intelligence

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

Apply for Positions

To apply for open positions visit Careers at the Software Engineering Institute.

Accessibility Needs for Applicants, Students and Visitors

Carnegie Mellon University makes every effort to provide physical and programmatic access individuals with disabilities. If you require an accommodation to participate in any part of the employment process, please contact Disability Resources by emailing access@andrew.cmu.edu or calling 412-268-3930.

Carnegie Mellon University considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.