Central Intelligence Agency
Cyber Security Researcher
Central Intelligence Agency, Washington, District of Columbia, us, 20022
Cyber Security Researchers focus in the cyber arena and specialize in the design, development, integration, and deployment of cutting-edge tools, techniques, and systems to support cyber operations.
Minimum Qualifications
3 years of experience with a system programming language (preferably C or C++) Knowledge of:
Operating system concepts (UNIX/Linux, Windows, iOS, or Android) such as Security models, File systems, Process management and isolation, Inter-process communication, Networking, Cryptography
Computer science fundamentals and software development best practices Basic Computer Network Exploitation (CNE) and Computer Network Attack (CNA) techniques and terminology Ability to design, develop, debug, and maintain a diverse portfolio of programs written in C/C++, using modern software development tools and methodologies Ability to work effectively in a team environment with competing and ever shifting priorities Ability to identify and manage risk Ability to demonstrate technical leadership Strong verbal and written communication skills, especially the ability to articulate technical requirements to a non-technical audience Passionate about information security Ability to meet the
minimum requirements for joining CIA , including U.S. citizenship and a background investigation Desired Qualifications
Master's or doctorate degree in one of the following fields:
Computer engineering Computer science Software engineering Cybersecurity Information security
Proficiency with a scripting language such as Python, Bash, Ruby, or Powershell; the ability to do the following with a scripting language:
Automate tasks Parse and interpret log output from operating systems, network devices, and infrastructure services
Experience with kernel level programming Familiarity with assembly for one or more architectures (ARM, MIPS, x86/x64) Familiarity with reverse engineering and/or exploitation
Experience in vulnerability analysis of source code or assembly Knowledge of exploitation techniques Familiarity of exploitation mitigation techniques Experience with Ghidra, IDA Pro, Binary Ninja, or a similar suite of tools
Knowledge of industry threat models such as MITRE's ATT&CK or Lockheed Martin's Cyber Kill Chain Knowledge of common reconnaissance, exploitation, and post-exploitation frameworks Knowledge of networking fundamentals at all OSI layers Experience in red teaming or pen-testing Any of the following certifications:
Certified Ethical Hacker Certified Penetration Tester OSCE GXPN GWAPT eWPTX ECPTX
#J-18808-Ljbffr
3 years of experience with a system programming language (preferably C or C++) Knowledge of:
Operating system concepts (UNIX/Linux, Windows, iOS, or Android) such as Security models, File systems, Process management and isolation, Inter-process communication, Networking, Cryptography
Computer science fundamentals and software development best practices Basic Computer Network Exploitation (CNE) and Computer Network Attack (CNA) techniques and terminology Ability to design, develop, debug, and maintain a diverse portfolio of programs written in C/C++, using modern software development tools and methodologies Ability to work effectively in a team environment with competing and ever shifting priorities Ability to identify and manage risk Ability to demonstrate technical leadership Strong verbal and written communication skills, especially the ability to articulate technical requirements to a non-technical audience Passionate about information security Ability to meet the
minimum requirements for joining CIA , including U.S. citizenship and a background investigation Desired Qualifications
Master's or doctorate degree in one of the following fields:
Computer engineering Computer science Software engineering Cybersecurity Information security
Proficiency with a scripting language such as Python, Bash, Ruby, or Powershell; the ability to do the following with a scripting language:
Automate tasks Parse and interpret log output from operating systems, network devices, and infrastructure services
Experience with kernel level programming Familiarity with assembly for one or more architectures (ARM, MIPS, x86/x64) Familiarity with reverse engineering and/or exploitation
Experience in vulnerability analysis of source code or assembly Knowledge of exploitation techniques Familiarity of exploitation mitigation techniques Experience with Ghidra, IDA Pro, Binary Ninja, or a similar suite of tools
Knowledge of industry threat models such as MITRE's ATT&CK or Lockheed Martin's Cyber Kill Chain Knowledge of common reconnaissance, exploitation, and post-exploitation frameworks Knowledge of networking fundamentals at all OSI layers Experience in red teaming or pen-testing Any of the following certifications:
Certified Ethical Hacker Certified Penetration Tester OSCE GXPN GWAPT eWPTX ECPTX
#J-18808-Ljbffr