Desired Skills and Experience

  • BS Computer Science or other related discipline and a minimum of three (3) years of related experience
  • MS in the same fields with one or more (1+) year’s relevant experience in analysis of digital artifacts or incident response
  • Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate travel (25%)
  • You will be subject to a background investigation and need to be eligible to obtain and maintain a Department of Defense security clearance
  • Ability to pay close attention to detail, meet deadlines, work under stress, and communicate effectively.
  • Design, develop, pilot and deliver products. Required to accurately represent FOI and its technical work in interactions with customers, sponsors, and the public.
  • Research and characterize security threats including defining appropriate countermeasures.
  • Interact with clients and staff of all levels in a highly professional and competent manner.
  • Act independently using CMU and SEI defined policies, practices, and procedures.
  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis
  • Understanding of common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls
  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP(S), TLS, DNS, SMTP, TCP/IP, ICMP, JSON, REST
  • 1+ years with some of the following scripting languages: SQL, Python, JavaScript, Perl, PHP and/or shell scripting
  • Understanding of Routing protocols for Cisco and Routers
  • Penetration Testing
  • Understanding of server/client/operating systems
  • Knowledge of common vulnerabilities, exploits and mitigations
  • Digital artifact analysis (host, network, mobile devices and IoT)
  • Incident Response
  • Ability to research and characterize security threats including defining appropriate countermeasures
  • Virtual infrastructure and hypervisors

Apply