Company:
Central Intelligence Agency
Location: Washington
Closing Date: 02/11/2024
Salary: £150 - £200 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description
Cyber Security Researchers focus in the cyber arena and specialize in the design, development, integration, and deployment of cutting-edge tools, techniques, and systems to support cyber operations.
Minimum Qualifications
- 3 years of experience with a system programming language (preferably C or C++)
- Knowledge of:
- Operating system concepts (UNIX/Linux, Windows, iOS, or Android) such as Security models, File systems, Process management and isolation, Inter-process communication, Networking, Cryptography
- Computer science fundamentals and software development best practices
- Basic Computer Network Exploitation (CNE) and Computer Network Attack (CNA) techniques and terminology
- Ability to design, develop, debug, and maintain a diverse portfolio of programs written in C/C++, using modern software development tools and methodologies
- Ability to work effectively in a team environment with competing and ever shifting priorities
- Ability to identify and manage risk
- Ability to demonstrate technical leadership
- Strong verbal and written communication skills, especially the ability to articulate technical requirements to a non-technical audience
- Passionate about information security
- Ability to meet the minimum requirements for joining CIA , including U.S. citizenship and a background investigation
Desired Qualifications
- Master's or doctorate degree in one of the following fields:
- Computer engineering
- Computer science
- Software engineering
- Cybersecurity
- Information security
- Proficiency with a scripting language such as Python, Bash, Ruby, or Powershell; the ability to do the following with a scripting language:
- Automate tasks
- Parse and interpret log output from operating systems, network devices, and infrastructure services
- Experience with kernel level programming
- Familiarity with assembly for one or more architectures (ARM, MIPS, x86/x64)
- Familiarity with reverse engineering and/or exploitation
- Experience in vulnerability analysis of source code or assembly
- Knowledge of exploitation techniques
- Familiarity of exploitation mitigation techniques
- Experience with Ghidra, IDA Pro, Binary Ninja, or a similar suite of tools
- Knowledge of industry threat models such as MITRE's ATT&CK or Lockheed Martin's Cyber Kill Chain
- Knowledge of common reconnaissance, exploitation, and post-exploitation frameworks
- Knowledge of networking fundamentals at all OSI layers
- Experience in red teaming or pen-testing
- Any of the following certifications:
- Certified Ethical Hacker
- Certified Penetration Tester
- OSCE
- GXPN
- GWAPT
- eWPTX
- ECPTX
Share this job
Central Intelligence Agency