Careers

At CERT, we study and solve problems with widespread cybersecurity implications, research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to help improve cybersecurity.

We develop tools, products, and  methods to help organizations conduct forensic examinations, analyze  vulnerabilities, and monitor large-scale networks. We help organizations determine how effective their security-related practices are. And we share our work at conferences; in blogs, webinars, and podcasts; and through our many articles, technical reports, and white papers.

Our work environment is collaborative in nature as staff members work on  cross-functional teams within the CERT Division, the Software Engineering Institute, other Carnegie Mellon departments, and across the global community. We also collaborate with high-level organizations, such as the U.S. Department of Defense and the Department of Homeland Security; law enforcement, including the FBI; the intelligence community; and many industry organizations.

Staff members say that one of the most satisfying aspects of working in the CERT Division "is being able to contribute to a global community that can impact the state of internet security."

Your top-notch skills and knowledge can help us make a difference in our nation's cybersecurity. To learn more about working at CERT, see Our Place at Carnegie Mellon University and Living in Pittsburgh.

Current Job Listings

The position you are looking for is not available. Please take a look at our current open positions listed below.

Select Job Location

Sort by Date Posted Title Location

29 Sep
2016
Senior Cyber Security Researcher - 2004139
Pittsburgh, PA

Position Summary: The CMU/SEI Forensic Operations and Investigations team is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 10 years, CERT has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, FOI is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

This individual will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. As a member of the FOI team this candidate will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital forensics and applied research in emerging areas of cybercrime. At times, this position will require the team member to develop and deliver training modules related the aforementioned domains.

The successful candidate must have proven computer forensics experience in multi-jurisdiction criminal investigations, be self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and instructional skills. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training: BS Computer Science, Information Security or other related discipline and a minimum of ten (10) years of related experience; or equivalent combination of training and experience.

Licenses: Certified Encase Examiner, ACE. CISSP, GIAC, SSCP, OSCP or other related/relevant certifications preferred.

Experience:  At least four or more (4+) year’s relevant experience in computer forensics, to include field and laboratory collection/imaging, analysis, with prior court room testimony preferred.  Technical experience required with host and network based forensics investigations and tools, analysis of Microsoft Windows, Unix/Linux and Mac OS operating systems, and removable media data recovery.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, have strong analytical and information organization skills, have excellent oral and written communication skills, and strong technical teaching skills.  Candidate must be skilled in instructional design, course development, and evaluation techniques.  Candidate must be able to multi-task and work effectively with multiple project teams and sponsors/customers. Technical proficiency with operating systems and detailed knowledge of network protocols are required.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with CRT for long periods of time.

Mental:  Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: BS in Computer Science, Information Security or other related discipline with a minimum of ten (10) years of applicable experience; MS in Computer Science, Information Security or other related discipline with a minimum of eight (8) years of applicable experience; PhD in Computer Science, Information Security or other related discipline with a minimum of five (5) years of applicable experience; or equivalent combination of training and experience.

Experience: Experience with state or federal law enforcement organization; operational knowledge of recently enacted state and federal laws and procedures relating to computer forensics investigations; coordination with criminal investigators, including courtroom testimony. 

Skills/Abilities:

  • Penetration Testing

  • Information and network security including experience with IDS/IPS

  • Knowledge of common vulnerabilities, exploits and mitigations

  • Digital Forensics (host, network and mobile devices)

  • Incident Response

  • Ability to research and characterize security threats including defining appropriate countermeasures

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis

  • Virtual infrastructure and hypervisors

  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP, TLS, DNS, SMTP, TCP/IP, ICMP, AJAX, JSON, REST

  • 2+ years with a scripting language including SQL, Python, Ruby, JavaScript, Perl, PHP and/or shell scripting

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions:  Required to design, develop, pilot and deliver products.  Required to accurately represent NSS and its technical work in interactions with customers, sponsors, and the public.

Supervision:  Contributes to hiring decisions of program staff; mentors junior staff; supervises student interns.  The experienced candidate may perform project management responsibilities.

 

Job Functions or Responsibilities:

55%     Operational support for SEI customers.

20%     Perform applied research in emerging areas of digital forensics.

15%     Deliver technical and management training to customers.

5%       Mentor, guide and interact with team and other staff.

5%       Contribute to the research and technical agendas of the FOI. 

 

Organizational Chart:  CERT Division Director, Technical Director, Cyber Security Solutions > Deputy Director, Cyber Security Solutions > Technical Manager, Forensic Operations and Investigations > Senior Cyber Security Researcher

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

29 Sep
2016
Cyber Security Engineer - Penetration Tester - 2004186
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with three (3) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as a penetration tester, system or network administrator, information systems auditor, software engineer, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

  • Popular penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap)

  • Knowledge of common networking protocols and services

  • Basic knowledge of exploit development and application fuzzing

  • Windows and Linux Operating System environments, networking devices, and common database platforms

  • Cyber security, survivability, and resilience concepts and issues

  • Software and systems engineering

  • Building and maintaining customer relationships

  • Data analytics and quantitative measures

  • Strategic Planning and requirements definition

  • Process improvement

  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, penetration testing, and telecommunications systems

  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards

  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues

  • Working knowledge of the DoD and Agency resilience needs and cyber security roadmaps

  • Development and delivery of information and infrastructure security risk and vulnerability evaluations

  • Ability to conduct analytical studies and investigations

  • Reasoning and problem-solving skills

  • Ability to work independently with limited supervision

  • Ability to interact effectively with diverse constituencies internally and externally

  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure

  • Ability to recognize and deal appropriately with confidential and sensitive information

  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks

  • Leadership and mentoring skills

  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations

  • Ability to work on customer sites with high-ranking members of the Federal Government and US

  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Must be able to work independently and travel as needed; this position requires frequent solo travel by car to customer sites in remote areas. Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. Candidates must be able to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with one (1) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA),

Experience: 

  • Expert proficiency with a variety of technical vulnerability analysis tools
  • Advanced penetration testing experience
  • Software development experience and advanced exploit development

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in risk and vulnerability assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and penetration testing; transition research into applied knowledge for customers.

10% Deliver courses on offensive security tools and tactics and penetration testing management.

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                     

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

 

 

14 Sep
2016
Senior Cyber Security Engineer - 2004113
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT® Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT® Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance Team.  The Cybersecurity Assurance team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to identify, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.  The individual will conduct applied research and perform assessments, diagnostics, and analysis techniques to better understand and mitigate risks to cyber environments and the organizational processes that depend on them.  Activities will include close work with customers from a variety of organizations, including DoD, government agencies, and commercial organizations.

 

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, information systems, or a related scientific/technical field with ten (10) years of experience.

Experience: Professional experience as a cybersecurity analyst, enterprise/security architect, or information system security specialist. Experience with and applied knowledge in

  • Information technology and telecommunications systems.
  • Cybersecurity, survivability, and resilience concepts and issues.
  • Software and systems engineering.
  • Building and maintaining DoD customer relationships.
  • Data Analytics and quantitative measures.
  • Strategic Planning and requirements definition.
  • Process Improvement.
  • Business Continuity/Disaster Recovery.
  • Operational Risk Management.
  • Program planning, budgeting, and management.        

Skills/Abilities: Must exhibit the following skills and abilities:

  • understanding of information technology and telecommunications systems.
  • working knowledge of network interoperability, cybersecurity, and survivability issues, including cybersecurity best practices and standards.
  • working knowledge of DHS critical infrastructure sectors and related security and resilience issues.
  • working knowledge of the DoD and Agency resilience needs and cybersecurity roadmaps.
  • development and delivery of information and infrastructure security risk and vulnerability evaluations.
  • ability to conduct analytical studies and investigations.
  • reasoning and problem-solving skills.
  • ability to work independently with limited supervision.
  • ability to interact effectively with diverse constituencies internally and externally.
  • ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure.
  • ability to recognize and deal appropriately with confidential and sensitive information.
  • ability to implement project plans, monitor project budgets, and identify and mitigate project risks.
  • leadership and mentoring skills.
  • excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations.
  • ability to work on customer sites with high-ranking members of the Federal Government and US Military to define customer requirements.
  • participation in professional society activities, particularly IEEE and ACM.

Physical/Mobility:  Primarily sedentary in an office setting with some mobility.  Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cybersecurity is critical for this position as are these abilities:

  • take or share leadership role in technical projects.
  • work meticulously with careful attention to detail.
  • meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities.
  • deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff.
  • ability to understand the big picture, direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other

  • Strong interest in cybersecurity and critical infrastructure protection analysis basis research, applied research, and development
  • Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements

Education/Training: MS in computer science, software engineering, information systems, or a related scientific/technical field with eight (8) years of experience.  PhD in computer science, software engineering, information systems, or a related scientific/technical field with five (5) years of experience.

Licenses: CISSP, CISM, CAP, GIAC, or similar; certifications from the audit discipline (such as CISA) are also acceptable.

Experience: In addition to the minimum experience above, preferred experience includes:

  • experience in both physical and cyber aspects of security; familiarity with resilience concepts.
  • familiarity with process improvement models such as CMMI or SixSigma, TQM, ISO9000, CERT-RMM.
  • familiarity with standards for measurement (including ISO 15939).
  • familiarity with NIST 800-series standards for information security.
  • familiarity with the DoD RMF standard for information assurance certification and accreditation.
  • familiarity with standards for security (ISO 27000), business continuity (BS 25999), and IT operations (ISO 20000).
  • working in a team environment on collaborative projects in critical infrastructure sectors involving network, system or data security.
  • experience and/or detailed understanding of the following:
    • networking
    • firewalls, intrusion detection systems, and other security technologies
    • security strategy and policies
    • IT risk management
    • Business continuity and disaster recovery
    • Cyber training development and cyber career management

Skills/Abilities: In addition to the minimum skills/abilities above, preferred skills/abilities include:

  • ability to lead work teams as needed.
  • consulting skills.
  • demonstrated ability to deliver coursework and training.
  • excellent oral and written communication skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development.  The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors.   Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

30%    Participate in the examination, analysis, and documentation of assessments, diagnostics, and analysis techniques for information and infrastructure security; examine data on cybersecurity and technology risks to identify problem areas and propose mitigation alternatives.

25%    Participate in the delivery of existing NSS cybersecurity, resilience, and risk assessment and analysis approaches with customers and partners;  participate in research, analysis, and documentation of cybersecurity issues, concerns, and risks at customer locations.

20%    Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cybersecurity and resilience; transition research into applied knowledge for customers

10%    Deliver courses in operational resilience management, cybersecurity management, and information security risk management.

SECONDARY FUNCTIONS

5%      Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest

5%      Contribute to and review the literature in cybersecurity, resilience, and software engineering

5%      Provide assistance and input to other teams and projects within the SEI

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cybersecurity Assurance Directorate < Technical Manager, Cybersecurity Assurance < Senior Cybersecurity Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

22 Jul
2016
Cyber Security Engineer - Exercise Developer - 2002530
Pittsburgh, PA or Arlington, VA

This position has multiple openings and can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with five (5) years of applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with two (2) year of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

14 Jun
2016
DevOps Engineer - 2003355
Arlington, VA

Position Summary: The CERT Program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. CERT engages in cutting-edge research and development in computer security.  The CERT Security Automation Directorate helps large network operators and security organizations in the USG distill actionable insights from networks through strategic analysis, tool building, and systems development.

As a member of the Deployment Team, the selected candidate will be responsible for developing, deploying, and evolving a network security test bed used for prototyping and systems analysis.  The selected candidate must be capable of administering commodity systems as well as operating specialized networking equipment and hardware.  As required, the candidate will support operational users and developers by using the test bed to verify engineering scenarios, create and test data-sets, and improve infrastructure automation.

 

Minimum Qualifications and Requirements:

Education/Training:  BS in computer science, software engineering, computer engineering, or a related quantitative field of study with eight (8) years of applicable experience. 

Experience:  Applicable experience in the design and implementation of complex testing and networking, including experience in:

  • Scripting (Python, Ruby, Perl).
  • System administration, monitoring, and automation in Unix/Linux.
  • Managing networks (switches, firewalls, routers, VPNs).

Skills/Abilities:

  • Deep familiarity with networking concepts, tools, etc.
  • Understanding of enterprise level communications.
  • Ability to execute test plans and report results, entry/exit documentation.
  • Excellent written and verbal communication skills.
  • Excellent reasoning and problem-solving skills.
  • Ability to work effectively without close supervision.
  • Ability to attend customer meetings and respond to customer requirements.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel up to 20% to customer sites.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; ability to deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort; ability to quickly learn new procedures, techniques, approaches, etc.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in computer science, software engineering, computer engineering, or a related quantitative field of study with five (5) years of applicable experience. 

Experience:             

  • Experience working in production computing environment.
  • Experience designing, operating, and maintaining environments that include Unix/Linux, Windows, virtualization, and network systems and hardware.
  • Experience automating infrastructure tasks using scripting languages. (Python, Ruby, Perl).
  • Experience automating infrastructure configuration management. (Puppet, Ansible, Chef, CFEngine).
  • Experience with DevOps methodologies.
  • Experience with commercial high speed network monitoring equipment.
  • Experience using network test equipment and network load generators.

 

Accountability: The individual is accountable for the definition, creation, maintenance, and technical support of:

  • A prototyping environment consisting of Unix/Linux, windows, virtualization, storage, and network systems and hardware.
  • Automated configuration management, monitoring, and alerting for designated systems.
  • Other products and customer deliverables including material for technical presentations and reports to customers, training material, and technical documentation.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual is expected to participate in the decision-making and problem-solving processes of operating, maintaining and implementing a multi-protocol multi-carrier prototype network environment.

Supervisory Responsibilities: This position does not formally supervise others.  However, the individual may act in a technical leadership (non-supervisory) role in regard to specific work products and activities, or in regard to student interns, etc.

 

Job Functions or Responsibilities:

45%     Manage the hardware and software of a prototype network security test-bed to include all appropriate system administration tasks and processes; provision for new requirements and growth.

30%     Define and execute tests in the network security test-bed on behalf of internal and external users.

20%     Build appropriate scenarios, profiles, and data-sets in support of internal and external users using the network security test-bed.

Secondary Functions

5%       Contribute to the broader security community.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Program < Technical Director < Technical Manager < DevOps Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

31 May
2016
International Cybersecurity Analyst - 2003200
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Program engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the US Department of Defense, federal civilian agencies, private sector organizations and their networked information systems. CERT supports government customers by developing and transitioning cutting-edge analysis techniques and tools, providing strategic advisement, and supporting tactical operations.

The International Cybersecurity Analyst is a member of the CERT technical staff and based either in the SEI Office in Pittsburgh, Pennsylvania or in Arlington, Virginia. The candidate selected to fulfil this role will provide technical subject matter expertise in CERT support of International cybersecurity efforts and associated capability and capacity development efforts. This support will include assisting with the development and pursuit of CERT strategic drivers for engaging in these initiatives and vision for cybersecurity community interaction, regularly interacting with sponsors and stakeholders of these efforts, and execution of efforts as directed by the International CSIRT Initiatives Team Lead to ensure that the work being performed drives toward sponsor goals and CERT strategic drivers.

 

Minimum Qualifications and Requirements:

Education / Training: Bachelor’s Degree in Computer Science or scientific/technical field with eight (8) years of experience; MS/MA in a scientific or technical field with five (5) years of experience; PhD in a scientific or technical field with two (2) years of experience; or equivalent combination of training and experience.

Experience: Professional experience should include five (5) or more years of experience supporting or managing large organizational or national-level CSIRT capabilities to include incident response, incident analysis, and development and implementation of mitigation actions and proactive security measures. This should include experience:

  • in creating, assessing, and improving these types of teams, as well as a working knowledge of existing global capabilities, advanced technology solutions and initiatives;
  • as an operational cybersecurity analyst, incident handler, or operations specialist;
  • working with and engaging people in diverse cultural environments, and;
  • fostering interaction and collaboration amongst peer organizations.

Skills / Abilities:

  • knowledge of current and effective CSIRT organizational and functional structures and the technical operations performed by these teams.
  • ability to work independently or within a team with members of varying skill sets and levels.
  • broad understanding of enterprise technology security issues.
  • broad working knowledge of commonly deployed computer network defense tools and processes to include leading vendor solutions.
  • ability to brief strategic and technical topics to senior management, technical and non-technical audiences.
  • knowledge of current operational challenges and technical threats faced by network security and intelligence organizations.
  • familiarity with project planning and management best practices.
  • ability to write / create clear, understandable documentation that translates complicated technical processes to a target audience (a writing sample is required).

Physical Mobility: Possibly sedentary, long periods of sitting, flexibility to travel to other campus locations or customer sites, frequent travel between Pittsburgh and Virginia offices, international travel as required.

Environmental Conditions: Normal office conditions, close contact with computer display for prolonged periods of time.

Mental: Ability to:

  • work meticulously with careful attention to detail.
  • meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities.
  • deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort.
  • develop and communicate innovative ideas.
  • take leadership role in technical projects.
  • quickly learn new procedures, techniques, and approaches.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education / Training: MS/MA in a scientific or technical field with five (5) years of experience; PhD in a scientific or technical field with two (2) years of experience; or equivalent combination of training and experience.

Licenses: CISSP, CEH, CISM, CompTIA, or similar.

Experience:

  • participation in broad public forums through activities such as standards, open source development, or publication.
  • experience publishing research and academic papers.
  • experience working with the government, or within a critical infrastructure sector.
  • active in regional or international trade-related organizations such as the Forum of Incident Response and Security Teams (FIRST), North American Network Operators' Group (NANOG), Messaging, Malware and Mobile Anti-Abuse Working Group (M3AAWG), Anti-Phishing Working Group (APWG), etc.
  • demonstrable experience effectively deliver training to technical and management level audiences on subject matter related to computer incident response team (CSIRT) development, incident response operations.
  • background in international capacity and community building.

 

Accountability: This position is accountable for ensuring that the International CSIRT Initiatives team delivers on the execution of the statement of work for customers sponsoring capability building efforts.  The individual is accountable for aligning cybersecurity operations projects with customer needs and re-prioritizing efforts as appropriate, in close coordination with the International CSIRT Initiatives Team Lead.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual is expected to participate in the decision-making and problem-solving processes of defining, designing, implementing, and sustaining national-level cybersecurity and related operations; suggesting and implementing policies and procedures to support these activities; and creating and sharing information regarding the state of the practice for broad dissemination.

Supervisory Responsibilities: This position will not formally supervise any personnel.

 

Job Functions or Responsibilities:

70%     Create framework and methodology documents, both general and specific to individual stakeholder groups, intended to facilitate the organizational and technical capacity development of international partners.

20%     Support planning, development, and execution of customer led and/or supported development activities, planning discussions, and awareness raising exercises. Through partnership, awareness, and action evaluate the need for, develop blueprints for, and assist with the implementation of national-level CYBERSECURITY capabilities.

10%     Capture knowledge from the engagements undertaken, integrate it with lessons learned from other similar work, and help transfer that knowledge for the betterment of the global CYBERSECURITY community.

100% TOTAL EFFORT

 

Organizational Chart:  CERT Program Director < Monitoring and Response Technical Director < Security Operations Technical Manager < International CSIRT Initiatives Team Lead < International Cybersecurity Analyst.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

18 May
2016
Security Operations Technical Manager - 2003124
Pittsburgh, PA

Position Summary: The CERT Program is a world-class program within the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Program engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the US Department of Defense, US Intelligence Community, federal civilian agencies, private sector organizations and their networked information systems. CERT supports government customers by developing and transitioning cutting-edge analysis techniques and tools, providing strategic advisement, and supporting tactical operations.

CERT is seeking a dynamic Security Operations Technical Manager (TM) who will lead, shape and manage the growth of a cutting edge security operations program. This candidate will be able to reason about complex problems, be an innovator, and a leader.

This candidate must be able to develop and execute a technical agenda and strategic roadmap to continually improve the state of the art and practice of Security Operations and Incident Management/Response. The TM will need to be able to communicate this technical vision and be capable of building consensus within the team and to maintain a successful culture built on high-quality and impactful customer work.

This approximately 20-person Security Operations team works from the SEI’s Pittsburgh and Arlington offices, and is embedded at USG facilities in the Washington DC-Baltimore area.  The position of technical manager is responsible for all aspects of developing and executing the body of work to include setting the technical direction; managing financials; business development; and personnel issues.

This role reports to the Director of Monitoring and Response, a directorate in the CERT Division.

 

Minimum Qualifications and Requirements:

Education/Training:  BS in a Computer Science or related scientific/technical field with ten (10) years’ experience, or equivalent combination of training and experience.

Experience:  Experience listed above should include:

  • Work in cyber security or intelligence operations;
  • Prior responsibility managing a team comprising a total of at least 10 individuals with commensurate personnel and financial authority.
  • These individuals should have had cyber operations roles.

Skills/Abilities: Working knowledge of:

  • Current security challenges and threats faced by a subset of the following audiences: USG intelligence, defense, law enforcement, civilian departments, and critical infrastructure.
  • USG mission’s areas/owners in cyber security.
  • Community best practices in cyber operations and associated tools/techniques.
  • Understanding of existing standards and models for security operations, incident response, intrusion analysis and cyber threat intelligence.
  • Internet protocols, operations, and governance.
  • International policies, frameworks, treaties and conventions.

Ability to:

  • Set and implement a strategic direction for a technical area and group.
  • Codify operational experience into best practices.
  • Conduct technical project management.
  • Brief strategic and technical topics to senior management and non-technical audiences;
  • Sustain a team with business development activity.
  • Foster professional growth and develop technical/professional leadership capabilities in technical staff.

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Arlington/Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (up to one 2 day trip every week).

Environmental Conditions: Normal office conditions; close contact with computer display for extended periods of time.

Mental:  The ability to: work meticulously with careful attention to detail; meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort; develop and communicate innovative ideas; and excellent oral and written communication skills.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in a related technical field with ten (10) years of experience, or equivalent combination of training and experience.

Experience:  Experience listed above should include:

  • Working for or supporting the USG.
  • Supporting multiple sponsors/customers.
  • Supporting customers in an operational security environment such as incident response, intelligence, or a security operations center.
  • Supporting elements of the critical infrastructure sectors or international NCSIRTs.
  • Leading community building activities in the critical infrastructure, NCSIRT, or USG space.
  • Establishing and defining processes for operational security organizations, and codifying best practices from community and operational experience.
  • Leading workforce/capacity building projects.
  • Prior responsibility in managing a team of 15-20 individuals with commensurate personnel and financial authority.
  • Participation in public and closed community security forums through activities such as publication, presentation, collaborative security operations, and collaborative research.
  • Experience leading work internationally.

Skills/Abilities:

  • Practical experience leading, defining, or applying TTPs for cyber operations; 
  • Working knowledge of secure systems and network architecture practices.

 

Accountability:  This position is accountable for the specification and execution of all any Incident Analysis technical area work plans and a subset of the SEI operational plan.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and CERT, defined policies, practices, and procedures.  Additionally, this position will define those set for their technical area and influence those set for CERT.

Decisions:  The individual in this position is expected to make strategic choices about the direction of the technical area that will be distilled into a technical agenda funded by a defined set of existing or new customers and implemented by a team hired to support the specifics tasking.

Supervisory Responsibilities:  This position has ultimate supervisory responsibility over all staff in the technical area to include hiring, performance reviews, salary adjustments, task assignment, and setting the tone and culture of the group.

 

Job Functions or Responsibilities:

30%     Manages group to effectively implement the SEI and task order work plans.  Sets goals and objectives and manages operational and functional business activities.   Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).

30%     Provides guidance to and monitors the success of team leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility.  Provides oversight of team leads and their supervisory responsibilities of technical staff and conducting performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff.

20%     Sets technical agenda of the technical area.  Leads planning process and contribute to the development the CERT strategic plan.  Ensures regular update of technical area’s plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy.  Articulates vision for internal and external audiences.

10%     Identifies opportunities for new technical projects and manages start-up of new, high-priority technical programs of work. Works with Technical Director of Response and Monitoring to develop and implement a funding and transition plan for new work areas.

10%     Directs organizational effectiveness and staff learning and development plans. Identifies operational success measures and process improvements.  Leads corrective action.

100% Total Effort

 

Organizational Chart: Division Director, CERT < Monitoring and Response Technical Director < Security Operations Technical Manager.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

18 May
2016
Managing Director, CERT Division
Pittsburgh, PA

Boyden Global Executive Search

Founded in 1946, Boyden is the oldest and one of the largest privately owned search firms in the world, with more than 65 offices in over 40 countries. In the world of executive search, Boyden is distinguished by the expertise of our consultants, the resources of our global firm, our commitment to our clients, and our culture of professionalism and integrity. For further information about Boyden, visit www.boyden.com.

 

Background

Our client, the Carnegie Mellon University Software Engineering Institute (SEI), is seeking a highly experienced, dynamic and visionary leader to fill the position of Managing Director, CERT Division. The position is located in Pittsburgh, PA and is open due to a planned retirement in September.

For over three decades, the Software Engineering Institute has been helping government and industry organizations to acquire, develop, operate, and sustain software systems that are innovative, affordable, enduring, and trustworthy. SEI serves the nation as a not-for- profit, Federally Funded Research and Development Center (FFRDC), specifically established by the U.S. Department of Defense (DoD) to focus on software and cybersecurity. SEI is based at Carnegie Mellon University, a global research university annually rated among the best for its programs in computer science and engineering.

As an FFRDC, the SEI fills voids where in-house and private sector research and development centers are unable to meet DoD core technology needs. For government and industry, the SEI is an objective, unbiased, honest broker that maintains a critical mass of top-caliber software and cyber professionals; provides a central repository for information about software engineering and cybersecurity; develops and maintains core competence in areas critical to the DoD; and  serves as an intellectual crossroads and catalyst for change.

SEI is composed of three business units:

  • Software Solutions Division
  • Emerging Technology Center
  • CERT Division

The CERT Division (CERT) is a national asset in the field of cybersecurity that is recognized as a trusted, authoritative organization dedicated to improving the security and resilience of computer systems and networks. CERT regularly partners with government, industry, law enforcement, and academia to develop advanced methods and technologies to counter large-scale, sophisticated cyber threats. CERT is a leader in:

  • Network Analysis
  • Analyzing cyber vulnerabilities in the critical infrastructure
  • Performing research to address insider threats

CERT has approximately 260 employees and represents $88.4 million of funding out of SEI’s total FY $137.2 million. FY 2016 projections are $97.2 million for CERT and $144.5 million for all of SEI. Because CERT is located within the SEI, the majority of its work contributes to government and national security efforts. CERT collaborates with high level government organizations such as the Department of Defense; Department of Homeland Security (DHS); law enforcement, including the FBI; the Intelligence Community; and many industry organizations. CERT also collaborates with non-Federal organizations to resolve software vulnerabilities.

For more information on SEI, please visit the SEI web site at www.sei.cmu.edu and for CERT, www.cert.org

 

Position

The Managing Director of the CERT Division reports to the Director & CEO of the SEI and is a member of the SEI’s Executive Leadership Team (ELT). CERT is the largest division bringing in nearly $100 million in funding to the SEI. This position is directly responsible for approximately 250 to 300 employees.

In addition to her/his duties and responsibilities as Managing Director, the selected individual is also expected to participate on research and science advisory boards, such as external advisory boards for other labs, science advisory boards, and/or programs conducted by the National Academies of Science and Engineering.

 

Key Responsibilities

The Managing Director’s primary responsibilities are to develop and implement the strategic plan and maintain oversight of the entire division including day-to-day management – direction of the research, development, and delivery of the products and technologies; and develop and manage work plans with SEI customers and collaborators.

Additional key responsibilities of the Managing Director include:

  • Developing, implementing and overseeing the strategy, direction, and management of SEI’s activities in the area of cybersecurity
  • Providing leadership, both horizontally and vertically across the SEI
  • Developing near- and long-term strategies and financial goals; within first 100 days develop a 2-year CERT strategic plan that aligns with the SEI Directors Office initiatives
  • Managing the DoD STE allocation of CERT
  • Leading the business development efforts relative to DoD, other Federal and Commercial clients to ensure aggressive long term growth in revenues and margins
  • Leading the strategic planning for and providing leadership and guidance to the business development efforts throughout the division; establish revenue  goals, KPIs, and oversight in the identification and closure of opportunities for expanding existing relationships and for new business including:
    •  Acquiring additional DoD business in the area of cybersecurity
    • Developing the intelligence business which will supplement CERT funding, but is not limited by STE ceiling
  • Nurturing existing client relationships and funded programs of work
  • Developing new clients in the non-DoD sector (other Federal clients and Commercial organizations)
  • Establish strategic alliances and joint ventures that will accrete to SEI’s growth across all business units
  • Building strategic Senior Leadership relationships with other organizations within the DoD
  • Working with the SEI Director’s Office and Chief Strategy Officer’s Office to establish and achieve an annual set of strategic goals in the areas of Technical, Research, Workforce, Customer, Revenue, and Mission
  • Building CERT’s management bench strength across the entire division and oversee formal performance management and succession planning
  • Being a team player and collaborator within CERT and across the SEI

 

Selection Criteria

The ideal candidate must have a minimum of fifteen (15) years of progressively increasing technical responsibilities managing research projects in a University, the Department of Defense, or in a software intensive systems environment at the classified level. He/she must have demonstrated experience in leading business development activities that result in substantial growth of revenues over time.

The ideal candidate must have experience in building and managing high technology teams and have the knowledge of DoD/IC computer science, cybersecurity, IT Architecture, or software technology. An M.S. degree in a technical field is required and an advanced business degree is desirable. Candidates must have a DoD Top Secret security clearance or the ability to obtain one.

The candidate must be able to demonstrate successful experience in managing a portfolio of large, complex, research projects that proved strategic in nature and the content of which have focused on information technology, software reliant systems, cybersecurity, and technology while also reflecting growth in revenue and assurance of compliance with policies/regulations. He/she should have experience with budget management responsibilities including monitoring financial information and performance against goals. Management experience within a university, government, military, and/or Fortune 500 technology-based organization is preferred. Candidates must be able to travel domestically and internationally up to 50% of the time.

Additionally, the candidate must possess/be:

  • A strategic thinker and capable of thinking outside-the-box
  • Experienced in financial management and personnel mentoring and oversight
  • Track record of accomplishments in leading the research and transition agenda for a technology-based organization
  • Experience in developing plans and managing projects (budget and schedules) in an integrated team environment
  • Demonstrated understanding of the current and future government cybersecurity needs
  • Understanding of how to commercialize DoD cyber technology and sell and market to the commercial community
  • Ability  to  collaborate  internally  and  partner  effectively  with  all  levels  of  the organization
  • Demonstrated  ability  in  leading  and  managing  senior  level  researchers  and engineers
  • Strong influencing, consensus building and engagement skills
  • Ability to collaborate and negotiate agreements with senior managers and officials both internally and externally
  • Reputation for highest level of integrity
  • Forward thinking and a creative change agent
  • Resourceful, committed, and accountable
  • High comfort level with ambiguity
  • Success at building consensus within a matrixed organization
  • Strong organizational, leadership, team building, and mentoring skills
  • Transparent and respectful of the views of others
  • Have great listening skills
  • Decisive decision maker
  • Excellent oral, written, and presentation skills
  • Confident but have one’s ego in control and have a healthy sense of humor

 

Compensation and Benefits

This is an outstanding career opportunity for an individual interested in a genuine professional challenge. With this position comes a very competitive compensation and benefits program.

 

HOW TO APPLY

The Officer-in-Charge of this engagement is Tim McNamara, Managing Partner. Linda Kearschner, Principal, is leading the recruiting effort for the project. Interested parties should submit, in electronic format, a resume with salary history and a cover letter outlining reasons for interest in this opportunity to lkearschner@boyden.com, or may call our toll free number at 1.877.2.BOYDEN (226-9336) or 1.202.536.5168 for additional information.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

16 May
2016
Cyber Security Engineer - Exercise Developer - 2003110
Pittsburgh, PA or Arlington, VA or REMOTE - Fort George G. Meade

This position has multiple openings and can be located in Pittsburgh, PA, Arlington, VA or Fort George G. Meade.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with five (5) years of applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with two (2) years of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

02 May
2016
Cyber Security Engineer - Exercise Developer - 2003017
Pittsburgh, PA or Arlington, VA or REMOTE - Fort George G. Meade

This position has multiple openings and can be located in Pittsburgh, PA, Arlington, VA, or Fort George G. Meade.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with three (3) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with one (1) years of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

24 Mar
2016
Malware Reverse Engineer - 2002795
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT Threat Analysis group aims to improve malware analysis capability while addressing active and emerging threats.  The successful candidate will reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex threats, and effectively participate in the broader security community.

Responsibilities: Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges; Design, prototype, and transition new analysis methods and tools; Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges Participate in the broader security community through collaboration, papers, and presentations.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor of Science in Computer Science, Software Engineering, Information Systems, or related field with three (3) years of experience, or equivalent; Master’s Degree in Computer Science, Software Engineering, Information Systems, or related field with one (1) year of experience.

Experience:                               

  • Reverse engineering software binaries.
  • Using disassemblers (ie. IDA Pro).
  • Using debuggers (ie. OllyDbg, Immunity, gdb, WinDbg).
  • Using hex editors and tools (ie. BinDiff).
  • C/C++ development.
  • x86 assembly language.
  • Windows Portable Executable (PE) file format Technical Writing Solid understanding of programming languages and operating system concepts.

Skills/Abilities:                  

  • technical writing.
  • analytical and problem solving skills.
  • develop and explain technical decisions.
  • prioritize work.
  • recognize and deal appropriately with confidential and sensitive information.
  • communicate effectively under normal and stressful situations.
  • handle shifting priorities.
  • mentoring/training skills.
  • interact effectively with technical and non-technical audiences both written and verbally.
  • work within a closely coordinated team.
  • work calmly and well under pressure.
  • maintain composure while dealing with difficult people.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.     

Other: Candidate will be required to travel on overnight assignments. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Experience:         

  • YARA.
  • IDAPro plug-in or IDAPython development.
  • Other assembly languages (ie. ARM, x86_64).
  • Python or Java development.
  • Assembly development.
  • Linker and/or Loader development or analysis Executable and Linker Format (ELF) file format Windows, Linux or Mac OS X.
  • APIs and security models.
  • Internet Protocols.
  • Cryptographic algorithms.
  • Kernel-level debugging (ie. WinDbg).
  • Device driver development.
  • Mobile device development.
  • Mobile device reverse engineering.
  • Software vulnerability analysis.
  • VirtualBox or VMWare admin or development Network packet captures (ie. Wireshark, pcap formats).

 

Accountability: Develop and implement project technical results.  Contribute to program objectives and plans development.  Keep in confidence sensitive information such as security, vulnerability, and site information.

Direction: The individual is expected to act independently in accordance with Carnegie Mellon, Software Engineering Institute, CERT Program, and CERT Threat Analysis procedures and policies, such as those involving product development, team interaction, and confidentiality.

Decisions: Must accurately represent the program in interactions with customers, sponsors, and the public.  Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities: This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:       

50%   Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges;

20%   Design, prototype, and transition new analysis methods and tools;

20%   Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges.

10%   Participate in the broader security community through collaboration, papers, and presentations.

100%      TOTAL EFFORT

 

Organizational Chart: CERT Program Director < CERT Threat Analysis Technical Director < CERT Malware Analysis Technical Manager < Malware Reverse Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

24 Mar
2016
Malware Reverse Engineer - 2002796
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT Threat Analysis group aims to improve malware analysis capability while addressing active and emerging threats.  The successful candidate will reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex threats, and effectively participate in the broader security community.

Responsibilities: Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges; Design, prototype, and transition new analysis methods and tools; Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges Participate in the broader security community through collaboration, papers, and presentations.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor of Science in Computer Science, Software Engineering, Information Systems, or related field with eight (8) years of experience, or equivalent; Master’s Degree in Computer Science, Software Engineering, Information Systems, or related field with five (5) year of experience; PhD in Computer Science, Software Engineering, Information Systems, or related field with two (2) year of experience.

Experience:                               

  • Reverse engineering software binaries.
  • Using disassemblers (ie. IDA Pro).
  • Using debuggers (ie. OllyDbg, Immunity, gdb, WinDbg).
  • Using hex editors and tools (ie. BinDiff).
  • C/C++ development.
  • x86 assembly language.
  • Windows Portable Executable (PE) file format Technical Writing Solid understanding of programming languages and operating system concepts.

Skills/Abilities:                  

  • technical writing.
  • analytical and problem solving skills.
  • develop and explain technical decisions.
  • prioritize work.
  • recognize and deal appropriately with confidential and sensitive information.
  • communicate effectively under normal and stressful situations.
  • handle shifting priorities.
  • mentoring/training skills.
  • interact effectively with technical and non-technical audiences both written and verbally.
  • work within a closely coordinated team.
  • work calmly and well under pressure.
  • maintain composure while dealing with difficult people.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.     

Other: Candidate will be required to travel on overnight assignments. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Experience:         

  • YARA.
  • IDAPro plug-in or IDAPython development.
  • Other assembly languages (ie. ARM, x86_64).
  • Python or Java development.
  • Assembly development.
  • Linker and/or Loader development or analysis Executable and Linker Format (ELF) file format Windows, Linux or Mac OS X.
  • APIs and security models.
  • Internet Protocols.
  • Cryptographic algorithms.
  • Kernel-level debugging (ie. WinDbg).
  • Device driver development.
  • Mobile device development.
  • Mobile device reverse engineering.
  • Software vulnerability analysis.
  • VirtualBox or VMWare admin or development Network packet captures (ie. Wireshark, pcap formats).

 

Accountability: Develop and implement project technical results.  Contribute to program objectives and plans development.  Keep in confidence sensitive information such as security, vulnerability, and site information.

Direction: The individual is expected to act independently in accordance with Carnegie Mellon, Software Engineering Institute, CERT Program, and CERT Threat Analysis procedures and policies, such as those involving product development, team interaction, and confidentiality.

Decisions: Must accurately represent the program in interactions with customers, sponsors, and the public.  Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities: This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:       

50%   Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges;

20%   Design, prototype, and transition new analysis methods and tools;

20%   Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges.

10%   Participate in the broader security community through collaboration, papers, and presentations.

100%      TOTAL EFFORT

 

Organizational Chart: CERT Program Director < CERT Threat Analysis Technical Director < CERT Malware Analysis Technical Manager < Malware Reverse Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

16 Mar
2016
Senior Software Assurance Engineer - 2002744
REMOTE - Bedford, MA

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

25 Feb
2016
Cyber Security Engineer - Penetration Tester - 2002651
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with eight (8) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as a penetration tester, system or network administrator, information systems auditor, software engineer, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

  • Popular penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap)

  • Knowledge of common networking protocols and services

  • Basic knowledge of exploit development and application fuzzing

  • Windows and Linux Operating System environments, networking devices, and common database platforms

  • Cyber security, survivability, and resilience concepts and issues

  • Software and systems engineering

  • Building and maintaining customer relationships

  • Data analytics and quantitative measures

  • Strategic Planning and requirements definition

  • Process improvement

  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, penetration testing, and telecommunications systems

  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards

  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues

  • Working knowledge of the DoD and Agency resilience needs and cyber security roadmaps

  • Development and delivery of information and infrastructure security risk and vulnerability evaluations

  • Ability to conduct analytical studies and investigations

  • Reasoning and problem-solving skills

  • Ability to work independently with limited supervision

  • Ability to interact effectively with diverse constituencies internally and externally

  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure

  • Ability to recognize and deal appropriately with confidential and sensitive information

  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks

  • Leadership and mentoring skills

  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations

  • Ability to work on customer sites with high-ranking members of the Federal Government and US

  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Must be able to work independently and travel as needed; this position requires frequent solo travel by car to customer sites in remote areas. Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. Candidates must be able to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA),

Experience: 

  • Expert proficiency with a variety of technical vulnerability analysis tools
  • Advanced penetration testing experience
  • Software development experience and advanced exploit development

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in risk and vulnerability assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and penetration testing; transition research into applied knowledge for customers.

10% Deliver courses on offensive security tools and tactics and penetration testing management.

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                     

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

25 Feb
2016
Cyber Security Engineer - Penetration Tester - 2002652
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with eight (8) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as a penetration tester, system or network administrator, information systems auditor, software engineer, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

  • Popular penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap)

  • Knowledge of common networking protocols and services

  • Basic knowledge of exploit development and application fuzzing

  • Windows and Linux Operating System environments, networking devices, and common database platforms

  • Cyber security, survivability, and resilience concepts and issues

  • Software and systems engineering

  • Building and maintaining customer relationships

  • Data analytics and quantitative measures

  • Strategic Planning and requirements definition

  • Process improvement

  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, penetration testing, and telecommunications systems

  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards

  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues

  • Working knowledge of the DoD and Agency resilience needs and cyber security roadmaps

  • Development and delivery of information and infrastructure security risk and vulnerability evaluations

  • Ability to conduct analytical studies and investigations

  • Reasoning and problem-solving skills

  • Ability to work independently with limited supervision

  • Ability to interact effectively with diverse constituencies internally and externally

  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure

  • Ability to recognize and deal appropriately with confidential and sensitive information

  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks

  • Leadership and mentoring skills

  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations

  • Ability to work on customer sites with high-ranking members of the Federal Government and US

  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Must be able to work independently and travel as needed; this position requires frequent solo travel by car to customer sites in remote areas. Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. Candidates must be able to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA),

Experience: 

  • Expert proficiency with a variety of technical vulnerability analysis tools
  • Advanced penetration testing experience
  • Software development experience and advanced exploit development

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in risk and vulnerability assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and penetration testing; transition research into applied knowledge for customers.

10% Deliver courses on offensive security tools and tactics and penetration testing management.

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                     

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

 

 

14 Aug
2015
Machine Learning Research Scientist -2001624
Pittsburgh, PA or Arlington, VA

Position Summary: Work with elite cybersecurity experts and university faculty to build new data mining technologies that will influence the national strategy against cyber attacks in the coming decades. Projects may include developing metrics and experimental designs for large-scale cybersecurity research programs, researching human-in-the-loop machine learning, and analyzing cybersecurity incident data. You will co-author research proposals, execute studies, and present findings to DoD sponsors and academic conferences. Consider applying for this position if you are a proven computer science expert with a firm grasp of security principles and statistical theory.

 

Minimum Qualifications and Requirements:

Education/Training: Background in machine learning, security, statistics, or related quantitative field with a Bachelor’s degree and eight (8) years of experience; Master’s degree and five (5) years of experience; PhD and two (2) years of experience; or equivalent combination of training and experience.

Experience: Two plus (2+) years of experience.

Skills/Abilities: An ideal candidate will have expertise in the following areas. Experience with specific methods is less important than evidence that you can learn.

  • Ability to perform computer science research related to cybersecurity
  • Basic grasp of statistical models
  • Comfortable working in the Unix command line
  • Demonstrated ability to work in a multi-disciplinary environment
  • Expert communication

Physical / Mobility:  Mostly sedentary, with occasional meetings in nearby buildings.

Environmental Conditions:  Close contact with computer for extended periods of time.

Mental:  Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities. Deal collaboratively, diplomatically, and successfully with customers and colleagues.

Other:  Candidates will undergo a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: PhD in machine learning, computer science, statistics, or other related quantitative field.

Experience: Two plus (2+) years of experience in computer science or machine learning.

Skills/Abilities:

  • Expertise implementing machine learning techniques (e.g., K-means, SVM, neural networks)
  • Familiar with at least one mathematical/statistical programming package (e.g., python numpy/scipy/pandas, R, MATLAB, etc.)
  • Strong software engineering skills
  • Cybersecurity or privacy experience
  • Experience supporting test and evaluation for large-scale government research programs is a plus

 

Decisions:  The individual must be able to make decisions about the proper scope of assigned research.  This includes being able to discern applicable paper topics, making decisions regarding experimental design and methods, and exercising strong time management skills.  The individual must accurately represent the program in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  This position may involve the training and supervision of graduate students and junior employees.

 

Job Functions or Responsibilities:

40%  Data analysis & data analysis tool development.

25%  Other types of research support including designing experiments and metrics.

15%  Participating in the research community, including attending and presenting at conferences, and reading and writing academic papers.

10%  Writing proposals and reports.                 

10%  Consulting and project planning with other groups in the SEI.

100% Total Effort

 

Organizational Chart:  CERT Program, Director > CERT Program, Technical Director for Cyber Security Foundations > Science of Cyber Security Research Manager > Applied Statistician / Data Scientist

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

Apply for Positions

To apply for open positions visit Careers at the Software Engineering Institute.

Search for Positions

Interested in working with us?

Search positions

Accessibility Needs for Applicants, Students and Visitors

Carnegie Mellon University makes every effort to provide physical and programmatic access individuals with disabilities. If you require an accommodation to participate in any part of the employment process, please contact Disability Resources by emailing access@andrew.cmu.edu or calling 412-268-3930.

Carnegie Mellon University considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.