ManTech is seeking a motivated, career and customer-oriented Cryptographic Vulnerability Analyst to join our team in the Linthicum location and will be part of a team that provides Cybersecurity Analysis and Cryptographic Engineering technical expertise.
Responsibilities include, but are not limited to:
Identify vulnerabilities and cybersecurity threats to program, functions, products, applications and systems
Leverage HUMINT, SIGINT, GEOINT, OSINT, and other information to assess vulnerabilities and conduct security evaluation of hardware and software components, architectures, algorithms and protocols
Analyze and characterize identified vulnerabilities and threats
Relate identified vulnerabilities and threats and the effects on the operations and missions supported by those systems
Compare and contrast various cryptographic attack techniques and developing operationally effective countermeasures
Provide formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems, technologies, applications, operations, or missions being studied
Collaborate with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
Use threat analysis and technical knowledge to provide security guidance and develop mitigations to threats and vulnerabilities
Team with threat analysts to conduct comprehensive, regular threat assessments of network cryptographic devices, components, and technologies
Create and maintain documentation on technical information and document research processes, analyses and/or the results
Write logical and accurate technical reports to communicate ideas across the enterprise
Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services
Evaluate methods, tools, and techniques that can be used to secure information/communication systems and the facilities that house them
Analyze data using mathematical/statistical methods
Analyze problems to determine technical solutions
Apply mathematical or computational methods and lines of reasoning
Evaluate technical proposals and solution designs
Identify new applications of known techniques
Identify vulnerabilities to attack communications networks and systems and developingcountermeasures
Perform security analysis, evaluation and guidance on the design and implementation ofcryptographic and communication protocols
Apply concepts and principles of computer security and vulnerability analysis
Work individually or as part of a team and may serve as a team lead
Basic Qualifications:
Bachelor's degree in Computer Science, Engineering, or Computer Engineering and 3 years of experience
Or a Master's degree in computer science, Engineering, or Computer Engineering and 1 year of experience
In lieu of a degree, a total of 8 years of relevant experience
Security Clearance Requirements:
Must have a current/active TS/SCI with polygraph
Physical Requirements:
Must be able to remain in a stationary position 50%.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations.
S:SKNSA GPSMALLA