Careers

At CERT, we study and solve problems with widespread cybersecurity implications, research security vulnerabilities in software products, contribute to long-term changes in networked systems, and develop cutting-edge information and training to help improve cybersecurity.

We develop tools, products, and  methods to help organizations conduct forensic examinations, analyze  vulnerabilities, and monitor large-scale networks. We help organizations determine how effective their security-related practices are. And we share our work at conferences; in blogs, webinars, and podcasts; and through our many articles, technical reports, and white papers.

Our work environment is collaborative in nature as staff members work on  cross-functional teams within the CERT Division, the Software Engineering Institute, other Carnegie Mellon departments, and across the global community. We also collaborate with high-level organizations, such as the U.S. Department of Defense and the Department of Homeland Security; law enforcement, including the FBI; the intelligence community; and many industry organizations.

Staff members say that one of the most satisfying aspects of working in the CERT Division "is being able to contribute to a global community that can impact the state of internet security."

Your top-notch skills and knowledge can help us make a difference in our nation's cybersecurity. To learn more about working at CERT, see Our Place at Carnegie Mellon University and Living in Pittsburgh.

Current Job Listings

The position you are looking for is not available. Please take a look at our current open positions listed below.

Select Job Location

Sort by Date Posted Title Location

09 Feb
2017
Cyber Security Engineer - 2004923
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the CERT Division. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with eight (8) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), and/or Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA) and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as an information security engineer, network security architect, information systems auditor, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common risk and cybersecurity assessment methods
  • Data analytics and cybersecurity metrics 
  • Cybersecurity laws, regulations, and standards
  • Common network security architectures
  • Common networking protocols and services
  • Cyber security, survivability, and resilience concepts and issues
  • Software and systems engineering
  • Building and maintaining customer relationships
  • Strategic Planning and requirements definition
  • Process improvement
  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, security assessment methods, and telecommunications systems
  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards
  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues
  • Working knowledge of the DoD and federal agency resilience needs and cyber security roadmaps
  • Development and delivery of information and infrastructure security risk and vulnerability evaluations
  • Ability to conduct analytical studies and investigations
  • Reasoning and problem-solving skills
  • Ability to work independently with limited supervision
  • Ability to interact effectively with diverse constituencies internally and externally
  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure
  • Ability to recognize and deal appropriately with confidential and sensitive information
  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks
  • Leadership and mentoring skills
  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations
  • Ability to work on customer sites with high-ranking members of federal agencies and DoD
  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects
  • Work meticulously with careful attention to detail
  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff
  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), and/or GIAC Penetration Tester (GPEN), and/or Certified Ethical Hacker (CEH), and/or Certified Information Systems Security Professional (CISSP), and/or Certified Information Systems Auditor (CISA)

Experience: 

  • Expert experience in risk and cybersecurity assessment methods
  • Advanced knowledge of network security architectures
  • Expert knowledge in cybersecurity laws, regulations, and standards
  • Expert experience in data analytics and cybersecurity metrics
  • Experience with common penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap
  • Experience with common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in cybersecurity assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cybersecurity and operational resilience; transition research into applied knowledge for customers.

10% Deliver courses in operational resilience management, cybersecurity management, and information security risk management

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                    

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Risk and Resilience< Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

09 Feb
2017
Senior Cyber Security Engineer - 2004924
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the CERT Division. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with ten (10) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), and/or Certified Information Security Manager (CISM), and/or Certified Information Systems Auditor (CISA) and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as an information security engineer, network security architect, information systems auditor, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common risk and cybersecurity assessment methods
  • Data analytics and cybersecurity metrics 
  • Cybersecurity laws, regulations, and standards
  • Common network security architectures
  • Common networking protocols and services
  • Cyber security, survivability, and resilience concepts and issues
  • Software and systems engineering
  • Building and maintaining customer relationships
  • Strategic Planning and requirements definition
  • Process improvement
  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, security assessment methods, and telecommunications systems
  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards
  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues
  • Working knowledge of the DoD and federal agency resilience needs and cyber security roadmaps
  • Development and delivery of information and infrastructure security risk and vulnerability evaluations
  • Ability to conduct analytical studies and investigations
  • Reasoning and problem-solving skills
  • Ability to work independently with limited supervision
  • Ability to interact effectively with diverse constituencies internally and externally
  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure
  • Ability to recognize and deal appropriately with confidential and sensitive information
  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks
  • Leadership and mentoring skills
  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations
  • Ability to work on customer sites with high-ranking members of federal agencies and DoD
  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects
  • Work meticulously with careful attention to detail
  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff
  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with eight (8) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), and/or GIAC Penetration Tester (GPEN), and/or Certified Ethical Hacker (CEH), and/or Certified Information Systems Security Professional (CISSP), and/or Certified Information Systems Auditor (CISA)

Experience: 

  • Expert experience in risk and cybersecurity assessment methods
  • Advanced knowledge of network security architectures
  • Expert knowledge in cybersecurity laws, regulations, and standards
  • Expert experience in data analytics and cybersecurity metrics
  • Experience with common penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap
  • Experience with common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in cybersecurity assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cybersecurity and operational resilience; transition research into applied knowledge for customers.

10% Deliver courses in operational resilience management, cybersecurity management, and information security risk management

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                    

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Risk and Resilience< Technical Manager, Cybersecurity Assurance Team < Senior Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

09 Feb
2017
Senior Software Assurance Engineer - 2004882
El Segundo, CA

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

03 Feb
2017
Senior Software Assurance Engineer - 2004868
REMOTE - Aurora, CO

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

31 Jan
2017
Cyber Security Engineer - Risk and Resilience - 2004871
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania and Arlington, Virginia. The CERT Program engages in cutting-edge research and development to improve the state of cybersecurity. As an Cyber Security Engineer, you have a strong desire and drive to contribute to team and customer objectives.

You are a team player with problem-solving skills and demonstrate solid presentation and writing skills. You are able to interact with clients and staff in a highly professional and competent manner. You enjoy the flexibility of an organization that values hard work but appreciates work-life balance and professional development. In your role, you will

  • Research and contribute to improvements in National and organizational policy
  • analyze and measure effectiveness of policy and governance
  • contribute to roadmaps for improvement of cybersecurity capabilities
  • assist in implementation of policy and governance
  • participate in applied research

 

Minimum Qualifications and Requirements:

Education/Training:  BS in relevant field or equivalent experience in professional position; MS degree preferred.

Experience: Experience in information security policy, governance, or leadership. Other potential career backgrounds include: audit, IT security, compliance, project management or similar technical occupation.

Experience and familiarity with;

  • cybersecurity concepts and technical implementations
  • cybersecurity standards, policies, and frameworks
  • strategic planning
  • metrics and measurements methodologies

Travel: Up to 25% travel to various customer locations

Physical Mobility:  Primarily sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions:  normal office conditions; however close contact with CRT for prolonged periods.

Mental:

  • ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • ability to collaborate diplomatically and successfully with customers, co-workers and other professional colleagues, managers, and staff.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.
 

Job Functions or Responsibilities:

70%   Participate as a team member in customer engagement to develop, analyze, and implement cybersecurity policy.

15%   Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security, policy/governance, and resilience; transition research into applied knowledge for customers.

5%   Support conferences, workshops, and meetings as a team contributor.

10%   Engage in professional development activities.

100% TOTAL EFFORT
 

Organizational Chart: Director CERT Program < Technical Director, Cybersecurity Risk and Resilience Directorate < Technical Manager, Cybersecurity Risk Management Team< Cyber Security Engineer – Risk and Resilience

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

31 Jan
2017
Senior Software Assurance Engineer - 2004867
Arlington, VA

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

20 Jan
2017
Project Administrator II - 2004798
Pittsburgh, PA

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

Role:  As a Project Administrator II, the successful candidate will work closely with the PMO Manager, Project Managers, and Technical Leads to plan, establish and effectively manage technical projects to achieve work plan goals and to meet internal and external management and reporting requirements.  You will perform administrative and PM duties in the Confluence wiki, JIRA, Microsoft Project, and other PM tools.  You will support the management and completion of projects, to include tracking deliverables, schedules, cost and major equipment and other purchases. You will oversee all aspects of projects, set deadlines, assign responsibilities, monitor progress, and produce reports for management.

Responsibilities include: 

  • PMO
    • Support PMO initiatives in process improvement
    • Support PMO & PMs in preparing and conducting internal and external project management activities
  • Project Administration
    • Define and control scope
    • Develop WBS, produce and manage schedule
    • Work with Technical Leads to produce resource and schedule estimates
    • Analyze actual cost and performance reports, identify variances, recommend responses
    • Resolve or escalate risks related to cost, quality, and schedule
    • Responsible for reporting progress, status, and issues to CERT and government program managers
    • Assist Project Managers and Technical Managers with the contracting and purchasing processes
    • Ensure contracts and purchases are effectively tracked in the project management process
  • Project Tools Administrator
    • Manage internal project information maintained in Atlassian Confluence & JIRA
    • Support users unfamiliar with tools
    • Perform troubleshooting
    • Perform Time and Task Management
    • Support creation of presentations for project management reviews

 

Minimum Qualifications and Requirement:

Education / Training: Bachelor’s degree in Business, Business Administration, Computer Science, or equivalent combination of training and experience.

Experience: Three (3) to five (5) years of related experience in project management with related experience in government contract management and purchasing.  Entry level candidates with less than three years of experience will be considered if college degree is focused management of information systems, project management, computer science, or accounting.

Skills / Abilities: Basic understanding and application of theoretical knowledge of specific field related to a particular position (i.e., Information Science, Finance, Business Administration, etc.); ability to function competently in a team environment, excellent analytical, organizational, reasoning, and problem solving skills; excellent verbal and written communication skills; computer literacy to include creation and management of financial management documents (spreadsheets) and the ability to maintain accurate and detailed records.

Mobility: Primarily sedentary, long periods of sitting, may have to travel to other campus locations or customer sites, some bending, stretching and lifting up to several reams of paper, etc.

Environmental Conditions: Work is usually performed in an office setting.  There may be close contact with CRT for long periods of time.

Mental: Ability to pay close attention to detail, meet inflexible deadlines, remain calm during difficult situations, work under pressure and work with frequent interruptions.

Other Week-end and evening hours may be required.  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements

Education / Training: Master’s degree or equivalent combination of training and experience.

Experience: Experience in administering and supporting projects in related areas such as IT security management, product development, deployment engineering, consulting or research.  Supervisory skills.

 

Accountability: Expected to determine own priorities based upon directorate and project strategy to meet performance objectives and established goals.  Actively participates on project teams and may be asked to plan, organize and execute special events for projects or for the directorate.

Direction: Performs under general supervision, supervisor only checks end results of work.  All normal duties and responsibilities are handled independently with the use of established procedures and policies.  Only the most difficult or unique situations are referred to the supervisor.

Decisions: Candidate sets own priorities and makes appropriate decisions for successful project execution within established guidelines, policies, financial regulations and leadership goals.

Supervisory Responsibilities: Depending upon directorate growth, the candidate may supervise other staff, including participation in the hiring process, and training of new staff employees.

 

Job Functions or Responsibilities:

80%     Project Development, Tracking and Execution Support

  • Project development administration
  • Establishing and maintaining project files
  • Project wiki and other tool administration
  • Collection, maintenance and reporting of directorate financial information
  • Customer deliverable tracking and reporting
  • CERT liaison to SEI Financial and Business Services (FABS)
  • Risk and Knowledge Management activities
  • Special event planning, coordination and management

20%     Technical Coordination

  • Responsible for the data collection and coordination of input for reports and internal reviews 
  • Gather, organize and produce statistical and information reports as requested by senior technical staff
  • Research and update operational statistical web sites

100% Total Effort

 

Organizational Chart: CERT Director< CERT Associate Director < CERT PMO Manager < CERT Project Manager < Project Administrator II

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

11 Jan
2017
Senior Software Assurance Engineer - 2002744
REMOTE - Bedford, MA

Position Summary: The CERT program of the Software Engineering Institute is looking to fill a leadership position improving the cyber security of acquisitions in the Air Force. This high visibility, high impact position will be responsible for helping senior leaders of Air Force programs improve the cyber resiliency of software intensive systems throughout the acquisition lifecycle, from requirements to development to deployment and sustainment.

This Senior Member of the Cyber Security Foundations directorate will be responsible for leading cross functional teams that enable the organizations within the Air Force to enhance the predictable performance and mission assurance in the acquisition, evolution and operations of software-reliant systems. Key activities include understanding customer requirements and key challenge problems and addressing them with tailored solutions; applying, adapting, integrating, verifying and transitioning applicable research and practices to maximize impact; creating, applying and codifying new approaches to support customer needs and advance the software security state of the practice; and maintaining situational awareness in technical and DoD domains. The candidate will coordinate closely with technical staff in CERT and other SEI programs to deliver cyber security technical expertise to customers throughout the life-cycle.

 

Minimum Qualifications and Requirements:

Education/Training: BS or equivalent degree in relevant discipline with ten (10) years applicable experience; MS or equivalent degree in relevant discipline with eight (8) years applicable experience; PhD or equivalent degree in relevant discipline with five (5) years applicable experience, or equivalent combination of training and experience.

Experience: The candidate must have experience in software engineering, development or management, and/or systems engineering. Must be knowledgeable of the software engineering and system engineering disciplines as well as understanding the DoD acquisition processes and relevant cyber security processes, such as the Risk Management Framework (RMF). The candidate should have experience building, leading, managing and participating on cross-functional, high technology teams, should be able to operate effectively with all organizations within the software and acquisition communities and be able to interact diplomatically with partners, customers and sponsors.

Skills/Abilities: Detailed knowledge of cyber security and mission assurance in the acquisition process; detailed knowledge of at least one core competency: requirements, architecture and design, program and acquisition management, performance improvement, or assurance.  Experience in five or more of the following: DoD software systems acquisition on major programs (For the purposes of this announcement, our definition of major is at least 100K SLOC of custom developed code, and/or significant integration of COTS/GOTS products); solid technical breadth and understanding of all aspects of the end-to-end software lifecycle (e.g., requirements, design, implementation, testing, etc.); alternative life cycles (e.g. waterfall, agile); major DoD software acquisition policies and directives; enterprise architecture ; software architecture development and evaluation, software architecture patterns (e.g. SOA) and concepts (e.g. Cloud computing); information Assurance/survivability; systems engineering on software intensive systems; COTS product integration; performance measurement including definition and application of goals, measurements and metric; system of systems engineering; requirements development and management; software integration and test and software/hardware integration; deployment of software intensive systems, especially including transition from legacy systems; cost estimation.

Strong written and verbal communications skills and the ability to present to high visibility stakeholders internal and external to the organization.  Proven program and project management skills including: interfacing with clients, developing proposals, and establishing relationships with new DoD and/or government clients and programmatic and project management skills (e.g., ability to develop project plans, track deliverables, manage risks, perform staff planning, provide budget oversight).  Ability to lead and participate in multidisciplinary teams.

Mobility: Will be required to travel on overnight assignments.

Environmental Conditions: Usual office setting, close contact with computer for prolonged periods of time.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: Master's degree in Computer Science, Information Systems, Systems Engineering, Software Engineering, or Acquisition Management.

Licenses: Certified DoD Acquisition Professional. Certified PMP.

 

Accountability:  The member will be directly accountable for understanding DoD acquisition and cyber security needs, applying new technologies, and establishing delivery capabilities to meet the needs of the sponsoring organization and the acquisition community.

Direction:  As a technical staff member, he/she will be expected to operate with minimum supervision using CMU and SEI defined practice, policies and procedures, in concert with the SEI mission.

Decisions:  Will be required to work with government program offices to identify strengths and weaknesses within the acquisition program and their contractor base and build solutions to address the weaknesses and recognize and encourage the strengths.

Supervisory Responsibilities:  Must be able to lead and supervise others.

 

Job Functions or Responsibility:

65%  Participate as a leader or member of technical teams in support of government acquisition program offices or participate as a member of a technical team performing research. Identify and support the implementation strategies for the capture and application of learning and knowledge transfer from assignments (e.g. dissemination of research results, case studies, guides, reports, presentations, articles, workshops, courses, and blog entries).

20%  Work with managers, business developers, current customers, and prospective customers to identify and define value-delivering opportunities and capture work.

10%  Other duties as assigned by management.

5%  Serve in an advisory capacity to other SEI technical programs on acquisition or technical issues.

100% TOTAL EFFORT

 

Organizational Chart:  SEI Director’s Office < Director, CERT < Technical Director, Cyber Security Foundations < Technical Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

11 Jan
2017
Senior Software Security Engineer - 2004716
Pittsburgh, PA

Position Summary: The Secure Coding Team, of the world renowned CERT division of the Software Engineering Institute, is a pioneer of the identification and development of secure coding and secure software development practices.  We are looking for exceptional candidates to help us continue our legacy of ground-breaking improvements for securing software during development.  Software has never been more important to our lives and our national security, nor has software insecurity ever been a greater risk.

Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, develop tools to evaluate and improve software, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will lead and participate in research and engineering projects that identify and implement best practices for organizations to develop secure software systems.  This will include developing and applying guidelines for writing secure code in C, C++, Java, and other popular languages.  It also includes developing and using tools to verify that software is developed securely.  The candidate will work directly with customers to: develop and provide training in secure coding practices; evaluate, extend, and use tools to improve and automate source code analysis; review and improve code bases to ensure that best practices are being followed; and enhance the customers’ organizational capabilities to produce secure software systems. The candidate will be expected to write reports and deliver presentations that explain the findings of research and software evaluations, helping customers improve their software to meet the security and privacy needs of their users.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Software Engineering, Information Science, or Information Systems Management with ten (10) years applicable experience.

Skills/Abilities: Successful candidates will have the ability to:

  • Develop and analyze source code in common programming languages such as C, C#, C++, Java, and Python, with a focus on secure coding principles and practices
  • Use static and dynamic analysis tools to evaluate software to find and remove vulnerabilities
  • Build and configure various software build enviornments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Develop and implement novel and advanced software analysis techniques
  • Develop and modify compilers and interpreters, understanding the underlying computer and compiler architectures, algorithms, performance trade-offs, and impact of optimization techniques on security issues
  • Lead projects in a team environment with other team members with varying skills, experience and locations
  • Plan and organize the evaluation approach for projects, including the collection and analysis of data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in large software systems, and to identify development process improvement opportunities.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with challenges while maintaining composure; work with sensitive information.       

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science, Software Engineering, Information Science, or Information Systems Management with eight (8) years applicable experience; or PhD in those disciplines with five (5) years applicable experience.

Skills/Abilities:

  • Work with DoD and other US Government software-intensive systems programs and software maintenance groups, understanding their unique needs, proposing and closing work to meet their needs, and lead projects to develop solutions that address their secure software development and acquisition needs.
  • Representing DoD and US Government program constituency and perspective based on experience to other team members to aid in developing relevant research and development proposals and solutions.
  • Transitioning knowledge, tools, and other work products from research projects to DoD and other US Government partners.
  • Develop approaches to address software assurance in the risk management framework context.
  • Develop and analyze software for specific platforms, such as mobile platforms and embedded systems.
  • Evaluate software assurance using a range of methods, such as dynamic and binary analysis, model checking, assertions, and semantic formalizations.

 

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

 

Job Functions or Responsibilities:

40%     Lead and directly support customer work in secure coding, verification and validation techniques, and technical training.  Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations.  Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

30%     Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

15%     Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15%     Develop knowledge and understanding of SEI capabilities; influence new SEI capabilities to be more applicable to customer problems; work directly with other SEI staff supporting the community with disciplines related to secure coding and secure development, sometimes in leadership role.

100%      TOTAL EFFORT

 

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Senior Software Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

11 Jan
2017
Software Security Analyst - 2004717
Pittsburgh, PA

Position Summary: The Secure Coding Team, of the world renowned CERT division of the Software Engineering Institute, is a pioneer of the identification and development of secure coding and secure software development practices.  We are looking for exceptional candidates to help us continue our leadership of ground-breaking improvements for securing software during development.  Software has never been more important to our lives and our national security, nor has software insecurity ever been a greater risk.

Joining the Secure Coding team, you will work with world-class cyber security experts to help software developers and software development organizations reduce vulnerabilities resulting from coding errors before they are deployed. We identify common programming errors that lead to software vulnerabilities, establish standard secure coding standards, develop tools to evaluate and improve software, educate software developers, and advance the state of the practice in secure coding that leads to secure software systems.

The successful candidate will participate in research and engineering projects that identify and implement best practices for organizations to develop secure software systems.  This will include developing and applying guidelines for writing secure code in C, C++, Java, and other popular languages.  It also includes developing and using tools to verify that software is developed securely.  The candidate will work directly with customers to: develop and provide training in secure coding practices; evaluate, extend, and use tools to improve and automate source code analysis; review and improve code bases to ensure that best practices are being followed; and enhance the customers’ organizational capabilities to produce secure software systems. The candidate will be expected to write reports and deliver presentations that explain the findings of research and software evaluations, helping customers improve their software to meet the security and privacy needs of their users.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science, Software Engineering, Information Science, or Information Systems Management with three (3) years applicable experience.     

Skills/Abilities: Successful candidates will have the ability to:

  • Develop and analyze source code in common programming languages such as C, C#, C++, Java, and Python, with a focus on secure coding principles and practices
  • Use static and dynamic analysis tools to evaluate software to find and remove vulnerabilities
  • Build and configure various software build environments, and build custom tools to integrate and automate the use of software building and analysis tools
  • Analyze data from multiple sources, generate defensible results, and represent them in reporting products and interactions with customers, sponsors, and the public
  • Contribute in a team environment with other team members with varying skills, experience and locations
  • Recognize and deal appropriately with confidential and sensitive information such as source code and software weaknesses and vulnerabilities
  • Develop and explain technical decisions and recommendations effectively with technical and non-technical audiences through verbal and written communications that lead to actionable and measurable improvements
  • Work meticulously with careful attention to detail required to identify defects and weaknesses in large software systems, and to identify development process improvement opportunities.
  • Be self-motivated and capable of self-learning to maintain a working knowledge of the ever-changing software development landscape.      

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with challenges while maintaining composure; work with sensitive information.       

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science, Software Engineering, Information Science, Information Systems Management with one (1) year applicable experience.

Skills/Abilities: Develop and analyze software for specific platforms, such as mobile platforms and embedded systems.

 

Accountability: Contributes to program objectives and plans development.

Direction: Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor. Ability to work directly on-site at a customer location with minimal direct supervision from direct supervisor.

Decisions: Participate in conferences and workshops where security-related issues are discussed as required.

 

Job Functions or Responsibilities:

40%     Directly support customer work in secure coding, verification and validation techniques, and technical training.  Tailor our current offerings to provide value to customers by evaluating their software, software development, and software acquisition/procurement practices, and providing improvement recommendations.  Communicate the findings of such evaluations through reports and presentations. Build new tools and capabilities that improve our ability to meet customer needs.

30%     Contribute to internally funded research projects, developing experimentation environments, evaluating secure software development practices, and communicating results internally and externally in reports and presentations.

15%     Codify knowledge that has been gained through customer and research projects to expand and update knowledge transfer materials, such as Secure Coding guidelines, training materials, and tools.

15%     Develop knowledge and understanding of SEI capabilities; learn how SEI capabilities can be applied to customer problems; work directly with SEI staff supporting the community with disciplines related to secure coding and secure development.

100%      TOTAL EFFORT

 

Organizational Chart: CERT Director < CERT/CSF Technical Director < CERT/Secure Coding Technical Manager < Software Security Analyst.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

11 Jan
2017
Project Manager - 2004715
Pittsburgh, PA

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems. 

A CERT Project Manager is a member of the CERT Delivery Management team that guides the development and execution of technical projects throughout the lifecycle.  The successful candidate will work closely with PMO Manager to plan and establish organizational project management processes to achieve needs of different departments.  The candidate will: develop project management processes and create improvement plans to meet business and project needs, perform administrative and PM duties, and be responsible for the management and completion of projects.  Activities will include oversight of all aspects of projects, setting deadlines, assigning responsibilities, monitoring progress, and producing reports for management.

Responsibilities:

  • Process Development & Continuous Improvement
    • Develop a systematic management approach for projects in alignment with the organization’s strategic business goals
    • Improve consistency in project management across the organization to promote collaboration and mobility
    • Increase collaboration, ease administration, and align with customer needs
    • Use feedback, direct experience, and new opportunities to improve and expand the capabilities of the project management office
  • Project Management
    • Lead team in creating and estimating a product backlog
    • Develop WBS, prioritize tasks, and setup sprints
    • Understand and communicate cost and schedule constraints to team
    • Work with teams to produce cost estimates, schedules, and financial reporting artifacts
    • Assist in managing the activities of non-organic employees and subcontractors who serve on the project team to ensure completion and acceptance of deliverables
    • Inform and capture resource allocation decisions for competing priorities across the organization.
    • Assemble project plans and, in conjunction with the technical lead, direct and monitor the work
    • Resolve or escalate risks related to cost, quality, and schedule
    • Responsible for reporting progress, status, and issues to CERT management and government program managers.
  • Project Tools Administrator
    • Use Atlassian tool suite, specifically Confluence and JIRA for managing project information
    • Develop Kanban boards, Sprint Reports, Epic Reports, and Velocity Charts
    • Create Business Intelligence Reports (SQL)

 

Qualifications and Requirements:

Education/Training:   MBA or MS in Computer Science, Software Engineering, Information Systems or related field or combination of training and experience.

Certifications (preferred): PMI certification, Certified Scrum Master, PMI-ACP, Certified Scrum Professional, CISM, CISSP, or equivalent.

Experience:  Designing, developing, or implementing information technology projects for government clients; exceptional interpersonal and technical writing skills; developing organizational project management processes and tools infrastructure. Candidate should have five to seven (5-7) years of project management experience with customer-focused technology projects such as product or service development, research and development or technical transition.

Skills/Abilities:   Working knowledge of Confluence and JIRA; analytical and technical problem-solving skills; possess strong customer service skills; motivated to tackle challenging problems; excellent organizational skills; communicate effectively within a team environment.

Physical Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.

Other:   Applicants must be willing to travel to the offices in Pittsburgh, PA; Arlington, VA; and customer sites in the Washington D.C. / Northern Virginia metro area. Candidate will be required to travel on overnight assignments. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Accountability: The Individual is accountable for: accurately capturing project requirements and managing projects through the lifecycle; working closely with technical project leads and CERT/SEI financial managers to ensure projects are accurately represented, managed and controlled.

Direction:  Performs under minimal supervision, independent judgment is encouraged.  Most normal duties and responsibilities are handled independently with the use of established procedures and policies.  Difficult or unique situations are referred to the supervisor.

Decisions:  Accurately represents the program and individual projects in interactions with internal branches, customers and sponsors.  The individual is expected to participate in the decision-making and problem-solving processes surrounding building accurate project plans, understanding the SEI financial system and making CERT decisions regarding effort allocations, sub-contract negotiations and purchasing.

Supervisory Responsibilities:  This position may include supervision of one of more Project Administrators.

 

Job Functions and Responsibilities:

40%     Project Manager, Scrum Master, Agile Facilitator

20%     Process development and continuous improvement

20%     Financial & Customer Management

10%     Contributing to and participating in business development, CERT management, and sponsor meetings.

10%     Develop knowledge and understanding of SEI capabilities; learning how SEI capabilities can be applied to customer problems.

100%      TOTAL EFFORT

 

Organizational Chart:  CERT Director < Associate Director < PMO Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

09 Jan
2017
Senior Software Engineer - 2004689
Pittsburgh, PA

Position Summary:  We are looking for a senior software engineer to help define and build the next generation of our external web presence. Our primary technology stack is Java/Tomcat using the Liferay DXP framework. We are in the process of rolling several externally facing web properties into a more unified presence that will allow our organization to better serve the government and ecommunity.  

This position participates in the full lifecycle of application development. Key responsibilities include collaborating with stakeholders to understand business processes, designing and implementing systems that meet those requirements, mentoring other team members, and shepherding the system throughout its lifecycle with other IT groups.

Key skills required for this position are primarily Java application development, and Java application frameworks such as Liferay, OSGI, and Hibernate. Also, a working knowledge of frontend web development such as HTML, CSS, JavaScript, JSP, and Freemarker, web service APIs such as REST, data exchange formats such as JSON, XML, and the ability to successfully work in a full-service development environment that uses source control, unit testing, issue tracking, and developer-level collaboration tools.

 

Minimum Qualifications and Requirements:

Education/Training:    Bachelor's degree in information systems or computer science, or equivalent combination of training and experience.

Experience:

  • Five years of Java development experience
  • Three years of development using the Liferay Platform 
  • Three years of web development (e.g., HTML, CSS, JavaScript) experience
  • Three years of experience with web application development, preferably with Java frameworks such as Spring, Struts, Hibernate, etc. and/or experience using application building blocks such as Node.js or AngularJS
  • Three years of experience coding applications that include an SQL-based database component
  • Three years of experience writing test cases, test scripts, and performing unit, functional, and integration testing
  • Experience with a modern source code control system (Git, SVN, Mercurial) and familiarity with modern code management concepts such as branching and merging.
  • One year of experience with a modern query and/or data interchange formats such as JSON, NoSQL-based technologies, and XML.

Skills/Abilities: Ability to work effectively on a small but dynamic team, prioritizing work on multiple simultaneous efforts with limited daily tasking from a supervisor. Must be able to clearly communicate information to technical and non-technical stakeholders. Must be a self-starter to research and learn new concepts and technologies to solve challenges.

Physical Mobility:  Sedentary in an office setting with some mobility. Daily foot travel between buildings in and around the CMU campus. Infrequent business travel required, usually to the SEI offices in Arlington, VA (approx. 2 times/year).

Environmental Conditions: Ability to use a computer keyboard and computer display for extended periods of time

Mental: Pay close attention to detail, meet inflexible deadlines, balance multiple tasks, remain calm during difficult situations, work under pressure, and work with frequent interruptions. Highly disciplined in terms of time-management and genuine positive attitude with a passion for the work and ability to project same to influence others.

Deal collaboratively, diplomatically, and successfully with partners, co-workers, and other professional colleagues, managers, and staff; develop and communicate innovative ideas; quickly learn new procedures, techniques, and approaches. Strong information organization skills as well as good oral and written communication skills are required.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements: 

Education/Training:    Master’s degree or equivalent in area of expertise

Experience:               

  • Experience developing applications for Liferay DXP
  • Three years of experience with collaboration/tracking tools like JIRA, Confluence, and Stash
  • Three years of experience researching, identifying, evaluating, and recommending technical solutions to solve business problems
  • Shell scripting in Unix/Linux
  • Domain knowledge of enterprise content management and portal-based systems
  • System administration in Unix/Linux
  • Experience with infrastructure provisioning tools such as Puppet
  • Experience with Microsoft SQL databases
  • Experience providing effective technical leadership on impactful projects involving customers / sponsor stakeholders

 

Accountability: Employee is accountable for describing, developing, implementing and/or maintaining, and providing support for enterprise applications and technology solutions supported by the Web Services development team. Employee is accountable for working collaboratively and strengthening relationships with internal customers to develop and implement technical solutions that solve critical enterprise and communication challenges.

Direction: Employee will be expected to work under minimum supervision within the defined scope of authority and in accordance with departmental and university procedures and policies. Difficult or unique situations are referred to the supervisor.

Decisions: Under management direction, the employee will decide the appropriate configuration for production applications and services supported by the Web Services Application Development team. Employee will communicate with team members and other IT groups on how best to allocate and/or acquire resources necessary to implement and evolve external-facing applications. Employee will determine the cause of problems in applications supported by the Web Services Application Development team and take corrective action in a timely fashion when a system/service fails or becomes unavailable. Employee will describe the appropriate procedures to configure and maintain applications supported by the Web Services Application Development team.

Supervisory Responsibilities: Employee may, at the manager or team leader’s discretion, task/supervise other employees in completion of specific tasks. Employee may be required to coach and mentor junior developers and/or direct activities of temporary / staff or contractors. 

 

Job Functions or Responsibilities:

50%     Application Development - Design, develop, test, and implement technical solutions that support the enterprise architecture and knowledge management platform. Collaborate with business teams, architects, and developers to understand high-level requirements and convert them into low-level specifications and system design plans. Design and develop applications in adherence with standards for code, design, performance, quality, security, and corporate policies. Define, conduct, and participate in testing including development walkthroughs. Assist in developing recommendations for future development, releases, and enhancements.

20%     Maintenance and Support – Troubleshoot and resolve problems with vendor products or in-house development applications. Adhere to change management practices and communicate changes and impact to those affected. Share knowledge and information with others and perform customer outreach to increase user adoption and collect feedback. Respond to outages and develop relationships with customers to accelerate user adoption and collect feedback.

30%     Technical Leadership – Take accountability for your own commitments, team deliverables, and overall team success. Recognize and escalate quality, deadline, or deliverables issues/ Provide technical leadership in the adoption and development of software engineering procedures, standards, and methods. Partner with internal teams to improve internal business processes. Participate in knowledge sharing activities with peers to increase knowledge of software development practices.

100% TOTAL EFFORT

 

Organizational Chart: SEI < Chief Information Officer < Web Services Lead < Senior Software Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

 

08 Dec
2016
Insider Threat Researcher - 2004595
Pittsburgh, PA or Arlington, VA

Position Summary: The goal of the Enterprise Threat and Vulnerability Management (ETVM) team is to assist organizations in improving their security posture and incident response capability by researching technical threat areas; developing information security assessment methods and techniques; and providing information, solutions and training for preventing, detecting, and responding to illicit activity. ETVM team members are domain experts in insider threat and incident response, and team capabilities include threat analysis and modeling; development of security metrics and assessment methodologies; and creation and delivery of training, courses, and workshops.

The selected individual will participate in the examination, analysis, documentation, modeling, and assessment of insider threat and electronic (cyber) and physical crime activity and information security risks to critical infrastructure systems. The selected individual will analyze technical and behavioral issues (potential risk indicators (PRIs) of insiders, and examine privacy concerns regarding organizational practices for identifying and mitigating insider threats.  The individual will work as a member of collaborative project teams in researching and implementing one or more projects composing these studies. This position will involve close work with customers from a variety of organizations, including government agencies and critical infrastructure providers.

 

Minimum Qualifications and Requirements:

Education/Training:  BS in computer science, software engineering, information systems, or a related technical field with eight (8) years’ experience or equivalent; MS in computer science, software engineering, information systems, a related technical field, or an advanced degree in psychology or other field that will assist in insider threat behavioral identification.

Experience:  Experience in research in a field relevant to insider threat (cyber and behavioral) or experience as a system/network administrator, information systems analyst, or behavioral psychologist.

Skills/Abilities:

  • basic knowledge of scientific research and design methodologies
  • broad understanding of network, database and application security issues
  • knowledge of privacy, intellectual property, technology, and legal issues
  • knowledge of insider threat vulnerability assessment criteria
  • ability to apply reasoning and problem-solving skills to conduct analytical studies and investigations
  • understanding of information technology and telecommunications systems
  • strong oral and written communications skills and ability to interact effectively with technical and non-technical audiences, as well as present in front of small and large groups; participate in external customer and sponsor meetings
  • reasoning and problem-solving skills
  • ability to work independently with limited supervision
  • ability to recognize and deal appropriately with confidential and sensitive information
  • participate in conferences and meetings
  • contribute to customer presentations and technology transfer activities
  • strong interest in security analysis R&D
  • ability to create instructional materials and conduct training
  • effective time management skills; and strong problem solving skills

Mobility:  Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites & various critical infrastructure sites.

Environmental Conditions:  Close contact with CRT for extended periods of time.

Mental:

  • ability and interest in addressing security issues in a holistic manner, addressing both organizational and technical policies and practices; as well as behavioral and organizational issues
  • ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • ability to deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

 

Preferred Qualifications and Requirements:

Education/Training:  MS in computer science, software engineering, information systems, or a related technical or behavioral field with at least five (5) years’ experience preferred; Knowledge of intellectual property or technology law. Certified Information Systems Security Professional (CISSP) or similar certification is desired.

Licenses:  

  • Insider Threat Vulnerability Assessor Certificate
  • Insider Threat Program Manager Certificate

Experience: 

  • experience working in or with the DOD, intelligence community, or law enforcement in a classified environment
  • experience in both physical and cyber security; experience in auditing or conducting assessments
  • experience performing insider threat vulnerability assessments
  • experience performing insider threat program evaluations
  • working in a team environment on collaborative projects in critical infrastructure sectors involving network, system or data security
  • experience employing software engineering techniques in designing and developing distributed, secure software, and experience with / knowledge of any of the following: system administration; networking; firewalls, intrusion detection systems, and other security technologies; application development/programming; relational databases
  • experience working with law enforcement and the intelligence community

 Skills/Abilities: 

  • working knowledge of network security/survivability
  • demonstrated ability to prepare papers and presentations for technical and non-technical audiences
  • knowledge of and experience with sound software engineering practices and best practices for information security
  • working knowledge of systems dynamic modeling techniques and modeling applications and tools
  • experience with statistical techniques
  • project management experience
  • leadership and mentoring skills

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results (this may include the detailed examination and analysis of law enforcement or classified case files). The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT’s defined policies, practices, and procedures – within the scope of assigned work, and to adhere to any additional sponsor-specified requirements related to the projects involved..

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at critical infrastructure locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position will involve the training and supervision of graduate students as well as serve in a mentor role for new employees.

 

Job Functions or Responsibilities:

60%     Participate in the examination, analysis, documentation, modeling, and assessment of insider threat and electronic crime activity (in the form of criminal case files, media reports, court transcripts, and other); examine cases and data on secure information technology risks and problem areas and propose mitigation alternatives.

30%     Participate in the development and delivery of security analysis and risk assessment approaches with customers and partners; participate in research, analysis, and documentation of physical/cyber security vulnerabilities at critical infrastructure sites.

10%     Contribute to conferences and meetings; participate in marketing calls on clients; give talks, lectures and workshops as appropriate.

100% TOTAL EFFORT

 

Organizational Chart: CERT Program, Director < Cyber Risk & Resiliency (CRR), Technical Director < Enterprise Threat & Vulnerability Management (ETVM), Technical Manager < Technical Team Lead – Enterprise Threat & Vulnerability Management

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

 

08 Dec
2016
Senior Cyber Security Engineer – Risk and Resilience - 2004596
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania and Arlington, Virginia. The CERT Program engages in cutting-edge research and development to improve the state of cybersecurity. As a Senior Senior Cyber Security Engineer, you have a background in cybersecurity policy and governance.

You are self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and writing skills. You are able to interact with clients and staff of all levels in a highly professional and competent manner. You enjoy the flexibility of an organization that values hard work but appreciates work-life balance and professional development. In your role, you will

  • shape National and organizational policy
  • analyze and measure effectiveness of policy and governance
  • develop roadmaps for improvement of cybersecurity capabilities
  • participate in standards making bodies
  • assist in implementation of policy and governance
  • participate in applied research

 

Minimum Qualifications and Requirements:

Education/Training:  BS or BA in relevant field with ten (10) years of experience; MS in relevant field with eight (8) years of experience

Experience: Eight (8) to ten (10) years of experience in information security policy, governance, or leadership. Other potential career backgrounds include: audit, IT security, compliance, or similar technical occupation.

Experience with and substantial knowledge of;

  • cybersecurity concepts and technical implementations
  • cybersecurity standards, policies, and frameworks
  • strategic planning
  • metrics and measurements methodologies

Travel: Up to 25% travel to various customer locations

Physical Mobility:  Primarily sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites

Environmental Conditions: normal office conditions; however close contact with CRT for prolonged periods

Mental:

  • ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • ability to collaborate diplomatically and successfully with customers, co-workers and other professional colleagues, managers, and staff.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.
 

Job Functions or Responsibilities:

70%   Participate in customer engagement to develop, analyze, and implement cybersecurity policy.

20%   Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security, policy/governance, and resilience; transition research into applied knowledge for customers.

5%   Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%   Engage in professional development activities.

100% TOTAL EFFORT

 

Organizational Chart: Director CERT Program < Technical Director, Cybersecurity Risk and Resilience Directorate < Technical Manager, Cybersecurity Risk Management Team< Senior Senior Cyber Security Engineer – Risk and Resilience

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

08 Dec
2016
Cyber Security Engineer - Risk and Resilience - 2004597
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania and Arlington, Virginia. The CERT Program engages in cutting-edge research and development to improve the state of cybersecurity. As an Cyber Security Engineer, you have a strong desire and drive to contribute to team and customer objectives.

You are a team player with problem-solving skills and demonstrate solid presentation and writing skills. You are able to interact with clients and staff in a highly professional and competent manner. You enjoy the flexibility of an organization that values hard work but appreciates work-life balance and professional development. In your role, you will

  • Research and contribute to improvements in National and organizational policy
  • analyze and measure effectiveness of policy and governance
  • contribute to roadmaps for improvement of cybersecurity capabilities
  • assist in implementation of policy and governance
  • participate in applied research

 

Minimum Qualifications and Requirements:

Education/Training:  BS or BA in relevant field or equivalent experience in professional position

Experience: Experience in information security policy, governance, or leadership. Other potential career backgrounds include: audit, IT security, compliance, project management or similar technical occupation.

Experience and familiarity with;

  • cybersecurity concepts and technical implementations
  • cybersecurity standards, policies, and frameworks
  • strategic planning
  • metrics and measurements methodologies

Travel: Up to 25% travel to various customer locations

Physical Mobility:  Primarily sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites

Environmental Conditions:  normal office conditions; however close contact with CRT for prolonged periods.

Mental:

  • ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities
  • ability to collaborate diplomatically and successfully with customers, co-workers and other professional colleagues, managers, and staff.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.
 

Job Functions or Responsibilities:

70%   Participate as a team member in customer engagement to develop, analyze, and implement cybersecurity policy.

15%   Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security, policy/governance, and resilience; transition research into applied knowledge for customers.

5%   Support conferences, workshops, and meetings as a team contributor.

10%   Engage in professional development activities.

100% TOTAL EFFORT
 

Organizational Chart: Director CERT Program < Technical Director, Cybersecurity Risk and Resilience Directorate < Technical Manager, Cybersecurity Risk Management Team< Cyber Security Engineer – Risk and Resilience

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

 

08 Dec
2016
Cyber Security Engineer - 2004578
REMOTE - San Antonio, TX

Position Summary: As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner. 

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with five (5) years of applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with two (2) years of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities:  Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:   Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

  

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications.

Experience:  US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities:  Strong presentation/platform skills and excellent writing skills

 

Accountability: The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:              

10%     Design and develop technical documents and instructional materials.

10%     Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%     Deliver technical and management training to customers.

55%     Mentor, guide and interact with team and other staff.

15%     Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

08 Dec
2016
Security Solutions Engineer - 2004593
Arlington, VA

Position Summary: The CERT Situational Awareness group researches and develops cutting-edge technical solutions for operational use in high-impact environments.  The CERT Situational Awareness Security Solutions Engineer will:

  • Provide strategic technical support to senior decision makers
  • Lead teams in the development of security architectures
  • Proivde systmes engineering, systems requirements development, technology evaluation and deployment guidance
  • Participate in technical efforts, including development and prototyping of new analysis techniques, tools, and platforms, preparation of analytic reports, and contributions to research publications
  • Be respected as a subject matter expert by customers, commercial vendors, and the Internet community as a whole
  • Be expected to appreciably advance the state of art of cybersecurity architectures

 

Minimum Qualifications and Requirements:

Education/Training/: Bachelor’s Degree in Computer Science or related scientific/technical field with ten (10) years experience in network operations, security operations, or network security research; Master’s Degree in Computer Science or related scientific/technical field with eight (8) years experience in network operations, security operations, or network security research; PhD in Computer Science or related discipline with two (2) years experience in network operations, security operations, or network security research; or equivalent combination of training and experience.

Professional Experience: Professional experience should include supporting technical decision-making, acquisition and management of large-scale enterprise network security or middleware systems. Experience with full life-cycle management, from costing, design, deployment, operation, maintenance, and retirement for enterprise scale systems is desired.

Skills/Abilities: Ability to function in the role of a consultant, subject matter expert and project manager. Proven ability to research, compare, test and evaluate alternative technical solutions, and communicate results. Planning and organizational skills; strong problem solving skills; excellent oral and written communication skills. Ability to work both independently and with teams. Proven ability to research, compare, test and evaluate alternative technical solutions, and communicate the results. Broad understanding of network, host and application security issues.  Experience in various arhcitecute roles (e.g. solution, system, enterprise) and architectures frameworks (e.g. TOGAF, DoDAF, etc.).  Ability to brief strategic and technical topics to senior management and non-technical audiences. Knowledge of current challenges and threats faced by USG network security and intelligence organizations. Ability to contribute to strategic direction for a technical group. Expertise in enterprise level systems in network security. Experience in enterprise level transaction systems. Experience in enterprise scale storage with a focus on performance.  Familiarity with various Internet protocols (e.g., TCP/IP, HTTP, DNS, SMTP, BGP, TLS).

Physical Mobility: Primarily sedentary in an office setting with some mobility. Flexibility to travel to various locations within the SEI and CMU community, including sponsor sites, conferences, and meetings.

Environmental Conditions: Normal office conditions; close contact with computer display for extended periods of time.

Mental: Ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; ability to participate in conversations collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to develop and communicate innovative ideas; ability to take leadership role in technical projects; ability to quickly learn new procedures, techniques, approaches, etc.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Licenses: Practical network security training (e.g. SANS GIAC Level 2 courses, GIAC Certifications, CCNP, CCIE Security, CISSP, CEH, CISM).

Skills/Abilities: Experience with: working with the government, or within a critical infrastructure sector; developing briefing materials for senior leadership within government or industry; deploying or supporting large-scale network security monitoring infrastructures; working with cloud platform delivery and service models; familiarity with distributed computing and/or big data platforms. Prior responsibility in managing a body of work consisting of numerous large scale projects and multiple customers/external sponsors. History of contributions to the broader industry or research community and experience in a variety of network security areas.

 

Accountability: The individual is accountable for: Active participation in the overall Situational Awareness R&D effort; Participating in the production of original publications in network security analysis; Participating in public speaking engagements, including at remote locations.

Direction: The individual is expected to act with minimal direction using CMU, SEI, CERT and Monitoring and Response defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual is expected to participate in the decision-making and problem-solving processes of basic requirements elicitation and validation participation in fundamental research in network security.

Supervisory Responsibilities: This position does not formally supervise others.  However, the individual will act in a technical leadership or project lead role in regard to specific work products and activities both at CMU and at the customer site.

 

Job Functions and Responsibilities:

75% Leads support to the customer program office in the areas of strategy; process/policies; requirements elicitation; design and architecture; operations; outreach; and training.

15% Enable the transition and appropriate focus of NetSA analysis and engineering approaches and tools into operational environments.

10% Design, prototype, and transition tactical analysis studies and tools appropriate for operational use in situational awareness.

100% TOTAL EFFORT

 

Organizational Chart: CERT/CC Director < Monitoring and Response Technical Director < Situational Awareness Technical Manager < Solutions Team Lead < Sr. Security Solutions Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

06 Dec
2016
Security Engineer - 2004555
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. CERT engages in cutting-edge research and development in computer security.  The CERT Security Automation Directorate helps large network operators and security organizations in the USG distill actionable insights from networks through strategic analysis, tool building, and systems development.

As a member of the Deployment Team, the selected candidate will be responsible for maintaining and evolving a network security test bed used for prototyping and systems analysis.  The selected candidate must be capable of administering commodity systems as well as operating specialized networking equipment and hardware.  As required, the candidate will support operational users and developer project teams.

 

Minimum Qualifications and Requirements:

Education/Training:  BS in computer science, software engineering, computer engineering, or a related quantitative field of study with eight (8) years of applicable experience. 

Experience:  Applicable experience in the design, implementation, and operation of commercial and open source applications including experience in:

  • Networking experience including; Cisco, Routers, Juniper firewalls, VPN (AnyConnect/ASA), OSPF (routing protocol)
  • System design including services, messaging, scalability, etc.      
  • Scripting (Python, Ruby, Perl).
  • System administration, monitoring, and automation in Unix/Linux.

Skills/Abilities:

  • Ability to evaluate and compare various solutions to identify benefits and constraints.
  • Excellent written and verbal communication skills.
  • Excellent reasoning and problem-solving skills.
  • Ability to work effectively without close supervision.
  • Ability to collaborate with customers and external parties.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel up to 20% to customer sites.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Ability to work meticulously with careful attention to detail; ability to meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; ability to deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort; ability to quickly learn new procedures, techniques, approaches, etc.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in computer science, software engineering, computer engineering, or a related quantitative field of study with five (5) years of applicable experience. 

Experience:

  • Knowledge of Security Operations including log/event management and data analysis techniques. ▪          Working in production computing environment using development and operational support tools like JIRA, Bitbucket, and Confluence.
  • Designing and operating environments that include Unix/Linux, Windows, virtualization, and networking hardware.
  • Automating tasks with DevOps methodologies (continuous integration) using Puppet, Ansible, Chef, etc.
  • Experience using traffic generators to support evaluation and testing functions.

 

 

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual is expected to participate in the decision-making and problem-solving processes of operating, maintaining and implementing a prototype network environment.

Supervisory Responsibilities: This position does not formally supervise others.  However, the individual may act in a technical leadership (non-supervisory) role in regard to specific work products and activities, or in regard to student interns, etc.

 

Job Functions or Responsibilities:

45%     Manage the hardware and software of a prototype network security test-bed to include all appropriate system administration tasks and processes; provision for new requirements and growth.

20%     Prototype solutions for system deployment/management (DevOps) problems.

20 %    Prototype technology and architectures for cyber defense capabilities including data analytics.

10%     Monitor community and marketplace developments for emerging technology and applicability to the cyber defense mission.

Secondary Functions

5%       Contribute to the broader security community.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Program < Technical Director < Team Lead < Integration Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

05 Dec
2016
Cyber Security Engineer - Insider Threat - 2004551
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Enterprise Threat and Vulnerability Management (ETVM) team, which focuses on assisting organizations in improving their insider threat mitigation and incident management practices and developing capabilities for preventing, detecting, deterring, and responding to evolving insider threats. ETVM team members are domain experts in insider threat and incident response, and team capabilities include threat analysis and modeling; development of security metrics and assessment and evaluation methodologies; and creation and delivery of controls, training, courses, and workshops.  

The individual in this position will be a part of the Technical Solutions team within ETVM. The Technical Solutions Team is responsible for the creation, development, and management of novel cybersecurity solutions that support customer driven operational and research missions. The Technical Solutions Team interacts with US Government departments and agencies, industry representatives, contractors, academia and others to identify gaps in cybersecurity tools, techniques, and procedures; create prototype capabilities to fill the gaps, and transition the prototype solutions to customers and partner organizations. The team frequently communicates their work to the community by publishing technical reports and white papers, and presenting at conferences, symposia, and other working groups.

 

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, information systems, or a related technical field with three (3) years of experience or equivalent, or MS in computer science, software engineering, information systems, or a related technical field with one (1) year of experience or equivalent.

Experience: 

  • professional experience in software engineering or cyber security.
  • experience applying the engineering process to solve complex real-world challenges. 
  • experience using analytical skills and an ability to interpret established standards and guidelines to solve problems.

Skills/Abilities:

  • system administration and network administration skills and familiarity with Windows, UNIX, LINUX operating systems.
  • software development in at least two of the following languages: C, C++, Java, Perl, and Python.
  • knowledge of core Internet protocols (TCP/IP, UDP, ICMP, DNS, FTP, SMTP, HTTP, SNMP, etc.).
  • knowledge of modern version control systems and integrated development environments.
  • understanding of network design and implementation at LAN and WAN levels.
  • broad understanding and application of multi-tiered enterprise client/server architectures, design, implementation and security.
  • software / systems development lifecycle, QA, testing, build process, revision control, and change management practices.
  • proven ability to innovate, develop, implement, and effectively document complex technical systems and approaches.
  • proven ability to integrate multiple technologies, standards and data sources into a consolidated solution.
  • knowledge of common cyber attack methodologies; common types of security vulnerabilities; basic computer security forensics.
  • strong oral and written communications skills (e.g., technical writing, user guide development, requirements analysis) and ability to interact effectively with technical and non-technical audiences, as well as present in front of small and large groups; participate in external customer and sponsor meetings.
  • ability to travel to various locations within the SEI and CMU community, customer sites, and offsite meetings with weekly/monthly frequency to travel on overnight and on-site assignments; ability to work in varied and diverse situations requiring analytical, interpretative, evaluative and constructive thinking;
  • manage workload and priorities on multiple scheduled assessments;
  • able to function independently or in teams depending on the project;
  • work under pressure; deal with stress;
  • deal with challenging individuals while maintaining composure;
  • ability to exercise tact and discretion when handling highly sensitive and confidential issues;
  • maintain confidentiality while working with highly confidential and sensitive matters.
  • handle sensitive data according to project and/or USG data handling procedures.
  • ability to interpret and communicate information about government regulations and university policies.
  • quantitative and qualitative analytical skills.
  • ability to trouble shoot problems proactively and to answer questions and handle issues as they arise.
  • effective time management skills; and strong problem solving skills.

Environmental Conditions:  close contact with computer monitor for extended periods of time.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training:  MS in Computer Science with one (1) years applicable experience; Current Associate Certified Information System Security Profession (CISSP), IEEE Professional Software Engineering Master Certification, or similar certification is desired.

Experience: 

  • experience with software development and/or system administration in large-scale, distributed computing environments.
  • experience developing materials for senior leadership in government or industry.
  • experience interfacing with the DOD, US federal civilian government, intelligence community, or law enforcement.
  • experience working in a classified environment.

Skills/Abilities: 

  • data mining.
  • machine learning. 
  • text and natural language processing.
  • proven skills working in a team environment on collaborative projects in US government, critical infrastructure sectors involving network, system or data security.

 

Accountability: The individual will be accountable for meeting established deadlines and project milestones. The individual will also be accountable for managing sensitive, and possibly classified, customer information.

Direction: The individual is expected to act in accordance with direct supervision from management and senior staff, as well as follow CMU, SEI, and CERT defined policies, practices, and procedures, and to adhere to any additional sponsor-specified requirements related to the projects involved.

Decisions:The individual must make sound decisions, and demonstrate a commitment to those decisions. The individual must also be able to escalate out-of-scope problems to more experienced team members. The individual must accurately represent the program in interactions with external customers, sponsors, and the public.

Supervisory Responsibilities: The individual may be responsible for managing student interns.

 

Job Functions or Responsibilities:

60%     Develop, deploy, and transition technical solutions for insider threat prevention, detection, and response.

15%     Participate in research into cutting-edge strategies for insider threat data collection and analysis techniques.

10%     Design and develop training materials for insider threat program practitioners.

10%     Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%       Provide assistance and input to other teams and projects within the SEI.

100% TOTAL EFFORT

 

Organizational Chart: CERT Program, Director < Risk and Resilience Directorate, Technical Director < Enterprise Threat & Vulnerability Management, Technical Manager < Technical Solutions, Technical Team Lead < Associate Cyber Security Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

23 Nov
2016
Cyber Security Engineer - Penetration Tester - 2004519
Pittsburgh, PA or Arlington, VA

This position can be located in Pittsburgh, PA or Arlington, VA.

Position Summary:  The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Cybersecurity Assurance (CA) Team within the Networked Systems Survivability Program. The CA team develops solutions (in the form of frameworks, models, tools, policies, practices, technical guidance, and training) that allow organizations to assess, analyze, and manage organizational, operational, and technical risks to mission-critical assets, processes, systems, and infrastructures.

 

Minimum Qualifications and Requirements:

Education/Training: BS in Computer Science (or other technical field) with eight (8) years’ experience, or equivalent combination of training and experience.

Certifications:  Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), and/or Certified Ethical Hacker (CEH)

Experience: Professional experience as a penetration tester, system or network administrator, information systems auditor, software engineer, information systems analyst, or similarly technical occupation.

Experience with and applied knowledge in:

  • Common penetration testing methodologies and tactics (PTES, OWASP testing guide, etc.)

  • Popular penetration testing toolsets (Metasploit framework, vulnerability scanners, web application scanners, Nmap)

  • Knowledge of common networking protocols and services

  • Basic knowledge of exploit development and application fuzzing

  • Windows and Linux Operating System environments, networking devices, and common database platforms

  • Cyber security, survivability, and resilience concepts and issues

  • Software and systems engineering

  • Building and maintaining customer relationships

  • Data analytics and quantitative measures

  • Strategic Planning and requirements definition

  • Process improvement

  • Program planning, budgeting, and management

Skills/Abilities: Must exhibit the following skills and abilities:

  • Understanding of information technology, penetration testing, and telecommunications systems

  • Working knowledge of network interoperability, cyber security, and survivability issues, including cyber security best practices and standards

  • Working knowledge of DHS critical infrastructure sectors and related security and resilience issues

  • Working knowledge of the DoD and Agency resilience needs and cyber security roadmaps

  • Development and delivery of information and infrastructure security risk and vulnerability evaluations

  • Ability to conduct analytical studies and investigations

  • Reasoning and problem-solving skills

  • Ability to work independently with limited supervision

  • Ability to interact effectively with diverse constituencies internally and externally

  • Ability to work well as a member of a cooperative team; ability to work in a matrix organizational structure

  • Ability to recognize and deal appropriately with confidential and sensitive information

  • Ability to implement project plans, monitor project budgets, and identify and mitigate project risks

  • Leadership and mentoring skills

  • Excellent written and oral communication skills; ability to contribute to technical research white papers and reports; ability to prepare papers and deliver presentations to technical and non-technical audiences; ability to contribute to customer technical exchanges and marketing presentations

  • Ability to work on customer sites with high-ranking members of the Federal Government and US

  • Participation in professional society activities, particularly IEEE and ACM 

Physical/Mobility: Primarily sedentary in an office setting with some mobility. Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities:

  • Take or share leadership role in technical projects

  • Work meticulously with careful attention to detail

  • Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities

  • Deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff

  • Ability to understand the direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Other: Must be able to work independently and travel as needed; this position requires frequent solo travel by car to customer sites in remote areas. Strong interest in cyber security and critical infrastructure protection analysis basis research, applied research, and development.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information. Candidates must be able to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in Computer Science (or related technical field) with five (5) years’ experience or equivalent experience.

Certifications:  Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and Certified Information Systems Auditor (CISA),

Experience: 

  • Expert proficiency with a variety of technical vulnerability analysis tools
  • Advanced penetration testing experience
  • Software development experience and advanced exploit development

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical results. The individual will also contribute to project, department, or program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and NSS defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation. 

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

 

Job Functions or Responsibilities:

60% Participate in risk and vulnerability assessments operating in a technical leadership role; analyze assessment data to identify risk areas and propose mitigation alternatives.

15% Participate in research into innovative and cutting-edge tools, techniques, and methods to improve cyber security and penetration testing; transition research into applied knowledge for customers.

10% Deliver courses on offensive security tools and tactics and penetration testing management.

5% Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5% Contribute to and review the literature in cyber security, resilience, and software engineering.

5% Provide assistance and input to other teams and projects within the SEI.                     

100% Total Effort

 

Organizational Chart:  Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Deputy Director, Cyber Security Solutions Directorate < Technical Manager, Cybersecurity Assurance Team < Cyber Security Engineer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

 

21 Nov
2016
Machine Learning Research Scientist - 2004504
Pittsburgh, PA or Arlington, VA

Position SummaryJoin us at the Software Engineering Institute at Carnegie Mellon University, home of CERT. Our team uses statistics and machine learning to influence our national cybersecurity strategy and protect our nation against cyber-related threats. A sampling of our current projects include:

 

  • Predicting cyber attacks using cybersecurity incident data
  • Engineering efficient data intake, processing, and reporting streams for a variety of intelligence-related data
  • Developing metrics and experimental designs for large-scale cybersecurity research programs
  • Classifying malware for our malware reverse engineers
  • Creating automated netflow classification tools for our network monitoring team

 

As part of your work, you will also have a chance to co-author research proposals, execute studies, and present findings to DoD sponsors and at academic conferences.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor of Science in CS, Math, Machine Learning, Stats, or related discipline, with relevant internship experience. Relevant professional work experience in software engineering or security a plus. Core competencies include fluency in statistical theory and statistical computing (Python-pandas, R, SQL, etc), superior teamwork skills, and exemplary communication skills.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Physical Mobility: Normally sedentary position with some mobility; able to travel to various SEI locations; may require some bending, stretching, pushing as well as lifting several reams of paper; dexterity to operate formal document assembly equipment.

Environmental Conditions: Usual office setting; close contact with CRT for long periods of time.

Mental: Ability to handle multiple tasks simultaneously; ability to successful complete task under inflexible time and quality pressure; ability to remain calm and composed when dealing with difficult people, situations, and frequent interruptions.

 

 Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

 

 

 

 

18 Nov
2016
Cyber Security Engineer - Insider Threat - 2004491
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Enterprise Threat and Vulnerability Management (ETVM) team, which focuses on assisting organizations in improving their insider threat mitigation and incident management practices and developing capabilities for preventing, detecting, deterring, and responding to evolving insider threats. ETVM team members are domain experts in insider threat and incident response, and team capabilities include threat analysis and modeling; development of security metrics and assessment and evaluation methodologies; and creation and delivery of controls, training, courses, and workshops.  

The individual in this position will be a part of the Technical Solutions team within ETVM. The Technical Solutions Team is responsible for the creation, development, and management of novel cybersecurity solutions that support customer driven operational and research missions. The Technical Solutions Team interacts with US Government departments and agencies, industry representatives, contractors, academia and others to identify gaps in cybersecurity tools, techniques, and procedures; create prototype capabilities to fill the gaps, and transition the prototype solutions to customers and partner organizations. The team frequently communicates their work to the community by publishing technical reports and white papers, and presenting at conferences, symposia, and other working groups.

 

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, information systems, or a related technical field with eight (8) years of experience or equivalent, or MS in computer science, software engineering, information systems, or a related technical field with five (5) years of experience or equivalent.

Experience: 

  • professional experience in software engineering or cyber security.
  • experience applying the engineering process to solve complex real-world challenges. 
  • experience using analytical skills and an ability to interpret established standards and guidelines to solve problems.

Skills/Abilities:

  • system administration and network administration skills and familiarity with Windows, UNIX, LINUX operating systems.
  • software development in at least two of the following languages: C, C++, Java, Perl, and Python.
  • knowledge of core Internet protocols (TCP/IP, UDP, ICMP, DNS, FTP, SMTP, HTTP, SNMP, etc.).
  • knowledge of modern version control systems and integrated development environments.
  • understanding of network design and implementation at LAN and WAN levels.
  • broad understanding and application of multi-tiered enterprise client/server architectures, design, implementation and security.
  • software / systems development lifecycle, QA, testing, build process, revision control, and change management practices.
  • proven ability to innovate, develop, implement, and effectively document complex technical systems and approaches.
  • proven ability to integrate multiple technologies, standards and data sources into a consolidated solution.
  • knowledge of common cyber attack methodologies; common types of security vulnerabilities; basic computer security forensics.
  • strong oral and written communications skills (e.g., technical writing, user guide development, requirements analysis) and ability to interact effectively with technical and non-technical audiences, as well as present in front of small and large groups; participate in external customer and sponsor meetings.
  • ability to travel to various locations within the SEI and CMU community, customer sites, and offsite meetings with weekly/monthly frequency to travel on overnight and on-site assignments; ability to work in varied and diverse situations requiring analytical, interpretative, evaluative and constructive thinking;
  • manage workload and priorities on multiple scheduled assessments;
  • able to function independently or in teams depending on the project;
  • work under pressure; deal with stress;
  • deal with challenging individuals while maintaining composure;
  • ability to exercise tact and discretion when handling highly sensitive and confidential issues;
  • maintain confidentiality while working with highly confidential and sensitive matters.
  • handle sensitive data according to project and/or USG data handling procedures.
  • ability to interpret and communicate information about government regulations and university policies.
  • quantitative and qualitative analytical skills.
  • ability to trouble shoot problems proactively and to answer questions and handle issues as they arise.
  • effective time management skills; and strong problem solving skills.

Environmental Conditions:  close contact with computer monitor for extended periods of time.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training:  MS in Computer Science with five (5) years applicable experience; Current Associate Certified Information System Security Profession (CISSP), IEEE Professional Software Engineering Master Certification, or similar certification is desired.

Experience: 

  • experience with software development and/or system administration in large-scale, distributed computing environments.
  • experience developing materials for senior leadership in government or industry.
  • experience interfacing with the DOD, US federal civilian government, intelligence community, or law enforcement.
  • experience working in a classified environment.

Skills/Abilities: 

  • data mining.
  • machine learning. 
  • text and natural language processing.
  • proven skills working in a team environment on collaborative projects in US government, critical infrastructure sectors involving network, system or data security.

 

Accountability: The individual will be accountable for meeting established deadlines and project milestones. The individual will also be accountable for managing sensitive, and possibly classified, customer information.

 

Direction: The individual is expected to act in accordance with direct supervision from management and senior staff, as well as follow CMU, SEI, and CERT defined policies, practices, and procedures, and to adhere to any additional sponsor-specified requirements related to the projects involved.

Decisions:The individual must make sound decisions, and demonstrate a commitment to those decisions. The individual must also be able to escalate out-of-scope problems to more experienced team members. The individual must accurately represent the program in interactions with external customers, sponsors, and the public.

Supervisory Responsibilities: The individual may be responsible for managing student interns.

 

Job Functions or Responsibilities:

60%     Develop, deploy, and transition technical solutions for insider threat prevention, detection, and response.

15%     Participate in research into cutting-edge strategies for insider threat data collection and analysis techniques.

10%     Design and develop training materials for insider threat program practitioners.

10%     Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%       Provide assistance and input to other teams and projects within the SEI.

100% TOTAL EFFORT

 

Organizational Chart: CERT Program, Director < Risk and Resilience Directorate, Technical Director < Enterprise Threat & Vulnerability Management, Technical Manager < Technical Solutions, Technical Team Lead < Associate Cyber Security Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

14 Nov
2016
Machine Learning Research Scientist - 2004458
Pittsburgh, PA or Arlington, VA

Position Summary: Work with elite cybersecurity experts and university faculty to build new data mining technologies that will influence the national strategy against cyber attacks in the coming decades. Projects may include developing metrics and experimental designs for large-scale cybersecurity research programs, researching human-in-the-loop machine learning, and analyzing cybersecurity incident data. You will co-author research proposals, execute studies, and present findings to DoD sponsors and academic conferences. Consider applying for this position if you are a proven computer science expert with a firm grasp of security principles and statistical theory.

 

Minimum Qualifications and Requirements:

Education/Training: Background in machine learning, security, statistics, or related quantitative field with a Bachelor’s degree and eight (8) years of experience; Master’s degree and five (5) years of experience; PhD and two (2) years of experience; or equivalent combination of training and experience.

Experience: Two plus (2+) years of experience.

Skills/Abilities: An ideal candidate will have expertise in the following areas. Experience with specific methods is less important than evidence that you can learn.

  • Ability to perform computer science research related to cybersecurity
  • Basic grasp of statistical models
  • Comfortable working in the Unix command line
  • Demonstrated ability to work in a multi-disciplinary environment
  • Expert communication

Physical / Mobility:  Mostly sedentary, with occasional meetings in nearby buildings.

Environmental Conditions:  Close contact with computer for extended periods of time.

Mental:  Meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities. Deal collaboratively, diplomatically, and successfully with customers and colleagues.

Other:  Candidates will undergo a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: PhD in machine learning, computer science, statistics, or other related quantitative field.

Experience: Two plus (2+) years of experience in computer science or machine learning.

Skills/Abilities:

  • Expertise implementing machine learning techniques (e.g., K-means, SVM, neural networks)
  • Familiar with at least one mathematical/statistical programming package (e.g., python numpy/scipy/pandas, R, MATLAB, etc.)
  • Strong software engineering skills
  • Cybersecurity or privacy experience
  • Experience supporting test and evaluation for large-scale government research programs is a plus

 

Decisions:  The individual must be able to make decisions about the proper scope of assigned research.  This includes being able to discern applicable paper topics, making decisions regarding experimental design and methods, and exercising strong time management skills.  The individual must accurately represent the program in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  This position may involve the training and supervision of graduate students and junior employees.

 

Job Functions or Responsibilities:

40%  Data analysis & data analysis tool development.

25%  Other types of research support including designing experiments and metrics.

15%  Participating in the research community, including attending and presenting at conferences, and reading and writing academic papers.

10%  Writing proposals and reports.                 

10%  Consulting and project planning with other groups in the SEI.

100% Total Effort

 

Organizational Chart:  CERT Program, Director > CERT Program, Technical Director for Cyber Security Foundations > Science of Cyber Security Research Manager > Applied Statistician / Data Scientist

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

28 Oct
2016
Cyber Security Engineer - Exercise Developer - 2004371
Pittsburgh, PA or Arlington, VA

This position has multiple openings and can be located in Pittsburgh, PA, Arlington, VA or Fort George G. Meade.

Position Summary:  As a member of CERT's Workforce Development program, the candidate will work with other team members in developing cyber-security training exercises and simulations, primarily for US military/government customers. This involves interacting directly with customers, gathering training requirements and objectives, producing and facilitating creative and engaging exercise scenarios, and building supporting physical and virtualized systems and network topologies. As such, the candidate will work regularly with a wide range of software and hardware technologies within CERT labs. The candidate may also assist in developing and teaching cyber security training content to external customers. The candidate will also be involved software and hardware prototype development.  Additionally, the position requires the candidate to have demonstrated and effective leadership/management abilities as he/she may supervise and evaluate full time direct reports as well as the activities of graduate student assistants. The successful candidate must be self-directed, have an interdisciplinary approach to problem solving, and work well communicating technical information to technical and non-technical users. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training:  Bachelor’s degree in Computer Science, Information Science, or related discipline with eight (8) years applicable working experience in information technology, Master’s degree in Computer Science, Information Science, or related discipline with five (5) years of applicable working experience in information technology, PhD Computer Science, Information Science, or related discipline with two (2) years of applicable working experience in information technology, or equivalent combination of training or experience.

Experience: Successful candidates must possess "hands-on" experience with Computer/Network Security and I.T. system and network administration. Additionally, he/she must have practical experience with Windows server and desktop platforms and Linux/Unix operating systems. The candidate must have experience in network design and troubleshooting and implementing standard networking protocols. Additionally, demonstrated practical experience working with common commercial and open-source cyber security tools is required. The candidate should have some experience teaching technical content to students, peers, and non-technical individuals and must enjoy doing so.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, strong analytical and information organization skills, excellent oral and written communication skills, and strong technical teaching skills. Candidate must be able to multitask and work effectively with multiple project teams and sponsors/customers. Experience with virtualization technologies, particularly VMWare ESX server is highly desired. Programming experience in C, C++, C#, Python, and Java is also highly desirable.

Physical Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with computer for long periods of time.

Mental: Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: BS and MS in Computer Science; training in enterprise security tools (i.e. McAfee ePO/HIPS, ArcSight, etc.)

Licenses: CISSP, Network+, Security+ and/or other industry standard certifications

Experience: US military service in a series of positions involving information technology, cyber security, and management of large scale government networks.

Skills/Abilities: Strong presentation/platform skills and excellent writing skills.

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products and may manage unclassified/classified DoD projects in excess of $3M annually.

Direction:  The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions: The incumbent must use good judgment to solve customer and personnel problems and is required to envision, design, develop, pilot, and deliver new capabilities, products, and services.  Candidate will also be required to accurately represent SEI/CERT and its technical work in interactions with customers, sponsors, and the public.

Supervisory Responsibilities:  The incumbent may have at least 2 direct reports as well as up to 15 secondary reports and will be required to provide performance management, career guidance, and take personnel corrective actions as required.

 

Job Functions or Responsibilities:

10%      Design and develop technical documents and instructional materials.

10%      Research, evaluate, develop, install/configure hardware and software including promising new technologies that require examination for cyber security research and development.

10%      Deliver technical and management training to customers.

55%      Mentor, guide and interact with team and other staff.

15%      Contribute to transition planning and strategy.

100% TOTAL EFFORT

 

Organizational Chart: Director, CERT Division < Technical Director, Cyber Security Solutions Directorate < Technical Manager, Cyber Workforce Development Initiative < Cyber Workforce Development Team Lead < Cyber Security Engineer - Exercise Developer

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

21 Oct
2016
Malware Reverse Engineer - 2004251
Pittsburgh, PA or Arlington, VA

Position Summary:  The CERT Threat Analysis group aims to improve malware analysis capability while addressing active and emerging threats.  The successful candidate will reverse engineer malicious code in support of high-impact customers, design and develop new analysis methods and tools, work to identify and address emerging and complex threats, and effectively participate in the broader security community.

Responsibilities: Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges; Design, prototype, and transition new analysis methods and tools; Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges Participate in the broader security community through collaboration, papers, and presentations.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor of Science in Computer Science, Software Engineering, Information Systems, or related field with eight (8) years of experience, or equivalent; Master’s Degree in Computer Science, Software Engineering, Information Systems, or related field with five (5) year of experience; PhD in Computer Science, Software Engineering, Information Systems, or related field with two (2) year of experience.

Experience:                               

  • Reverse engineering software binaries.
  • Using disassemblers (ie. IDA Pro).
  • Using debuggers (ie. OllyDbg, Immunity, gdb, WinDbg).
  • Using hex editors and tools (ie. BinDiff).
  • C/C++ development.
  • x86 assembly language.
  • Windows Portable Executable (PE) file format Technical Writing Solid understanding of programming languages and operating system concepts.

Skills/Abilities:                  

  • technical writing.
  • analytical and problem solving skills.
  • develop and explain technical decisions.
  • prioritize work.
  • recognize and deal appropriately with confidential and sensitive information.
  • communicate effectively under normal and stressful situations.
  • handle shifting priorities.
  • mentoring/training skills.
  • interact effectively with technical and non-technical audiences both written and verbally.
  • work within a closely coordinated team.
  • work calmly and well under pressure.
  • maintain composure while dealing with difficult people.

Mobility: Primarily sedentary, long periods of sitting; ability to travel to various locations within the SEI and Carnegie Mellon community, customer sites, conferences, and offsite meetings with some frequency.

Environmental Conditions:  Normal office conditions, close contact with computer for prolonged periods of time.

Mental: Ability to work under pressure and changing priorities; pay attention to detail; meet inflexible deadlines; deal with difficult individuals while maintaining composure.     

Other: Candidate will be required to travel on overnight assignments. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Experience:         

  • YARA.
  • IDAPro plug-in or IDAPython development.
  • Other assembly languages (ie. ARM, x86_64).
  • Python or Java development.
  • Assembly development.
  • Linker and/or Loader development or analysis Executable and Linker Format (ELF) file format Windows, Linux or Mac OS X.
  • APIs and security models.
  • Internet Protocols.
  • Cryptographic algorithms.
  • Kernel-level debugging (ie. WinDbg).
  • Device driver development.
  • Mobile device development.
  • Mobile device reverse engineering.
  • Software vulnerability analysis.
  • VirtualBox or VMWare admin or development Network packet captures (ie. Wireshark, pcap formats).

 

Accountability: Develop and implement project technical results.  Contribute to program objectives and plans development.  Keep in confidence sensitive information such as security, vulnerability, and site information.

Direction: The individual is expected to act independently in accordance with Carnegie Mellon, Software Engineering Institute, CERT Program, and CERT Threat Analysis procedures and policies, such as those involving product development, team interaction, and confidentiality.

Decisions: Must accurately represent the program in interactions with customers, sponsors, and the public.  Participate in conferences and workshops where security-related issues are discussed as required.

Supervisory Responsibilities: This position has no supervisory responsibilities.

 

Job Functions or Responsibilities:       

50%   Perform in-depth reverse engineering of malicious code, document and transition results in reports, presentations, and technical exchanges;

20%   Design, prototype, and transition new analysis methods and tools;

20%   Identify and document high-impact, emerging, and complex active security threats; design and pursue solutions; and transition results in tools, reports, presentations, and technical exchanges.

10%   Participate in the broader security community through collaboration, papers, and presentations.

100%      TOTAL EFFORT

 

Organizational Chart: CERT Program Director < CERT Threat Analysis Technical Director < CERT Malware Analysis Technical Manager < Malware Reverse Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

17 Oct
2016
Cyber Security Engineer - Insider Threat - 2002835
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Division is part of the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Division engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the DoD, federal civilian agencies, private sector organizations and their networked information systems.

The individual in this position will work as a member of the Enterprise Threat and Vulnerability Management (ETVM) team, which focuses on assisting organizations in improving their insider threat mitigation and incident management practices and developing capabilities for preventing, detecting, deterring, and responding to evolving insider threats. ETVM team members are domain experts in insider threat and incident response, and team capabilities include threat analysis and modeling; development of security metrics and assessment and evaluation methodologies; and creation and delivery of controls, training, courses, and workshops.  

The individual in this position will be a part of the Technical Solutions team within ETVM. The Technical Solutions Team is responsible for the creation, development, and management of novel cybersecurity solutions that support customer driven operational and research missions. The Technical Solutions Team interacts with US Government departments and agencies, industry representatives, contractors, academia and others to identify gaps in cybersecurity tools, techniques, and procedures; create prototype capabilities to fill the gaps, and transition the prototype solutions to customers and partner organizations. The team frequently communicates their work to the community by publishing technical reports and white papers, and presenting at conferences, symposia, and other working groups.

 

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, information systems, or a related technical field with three (3) years of experience or equivalent, or MS in computer science, software engineering, information systems, or a related technical field with one (1) year of experience or equivalent.

Experience: 

  • professional experience in software engineering or cyber security.
  • experience applying the engineering process to solve complex real-world challenges. 
  • experience using analytical skills and an ability to interpret established standards and guidelines to solve problems.

Skills/Abilities:

  • system administration and network administration skills and familiarity with Windows, UNIX, LINUX operating systems.
  • software development in at least two of the following languages: C, C++, Java, Perl, and Python.
  • knowledge of core Internet protocols (TCP/IP, UDP, ICMP, DNS, FTP, SMTP, HTTP, SNMP, etc.).
  • knowledge of modern version control systems and integrated development environments.
  • understanding of network design and implementation at LAN and WAN levels.
  • broad understanding and application of multi-tiered enterprise client/server architectures, design, implementation and security.
  • software / systems development lifecycle, QA, testing, build process, revision control, and change management practices.
  • proven ability to innovate, develop, implement, and effectively document complex technical systems and approaches.
  • proven ability to integrate multiple technologies, standards and data sources into a consolidated solution.
  • knowledge of common cyber attack methodologies; common types of security vulnerabilities; basic computer security forensics.
  • strong oral and written communications skills (e.g., technical writing, user guide development, requirements analysis) and ability to interact effectively with technical and non-technical audiences, as well as present in front of small and large groups; participate in external customer and sponsor meetings.
  • ability to travel to various locations within the SEI and CMU community, customer sites, and offsite meetings with weekly/monthly frequency to travel on overnight and on-site assignments; ability to work in varied and diverse situations requiring analytical, interpretative, evaluative and constructive thinking;
  • manage workload and priorities on multiple scheduled assessments;
  • able to function independently or in teams depending on the project;
  • work under pressure; deal with stress;
  • deal with challenging individuals while maintaining composure;
  • ability to exercise tact and discretion when handling highly sensitive and confidential issues;
  • maintain confidentiality while working with highly confidential and sensitive matters.
  • handle sensitive data according to project and/or USG data handling procedures.
  • ability to interpret and communicate information about government regulations and university policies.
  • quantitative and qualitative analytical skills.
  • ability to trouble shoot problems proactively and to answer questions and handle issues as they arise.
  • effective time management skills; and strong problem solving skills.

Environmental Conditions:  close contact with computer monitor for extended periods of time.

Other:  Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training:  MS in Computer Science with one (1) years applicable experience; Current Associate Certified Information System Security Profession (CISSP), IEEE Professional Software Engineering Master Certification, or similar certification is desired.

Experience: 

  • experience with software development and/or system administration in large-scale, distributed computing environments.
  • experience developing materials for senior leadership in government or industry.
  • experience interfacing with the DOD, US federal civilian government, intelligence community, or law enforcement.
  • experience working in a classified environment.

Skills/Abilities: 

  • data mining.
  • machine learning. 
  • text and natural language processing.
  • proven skills working in a team environment on collaborative projects in US government, critical infrastructure sectors involving network, system or data security.

 

Accountability: The individual will be accountable for meeting established deadlines and project milestones. The individual will also be accountable for managing sensitive, and possibly classified, customer information.

Direction: The individual is expected to act in accordance with direct supervision from management and senior staff, as well as follow CMU, SEI, and CERT defined policies, practices, and procedures, and to adhere to any additional sponsor-specified requirements related to the projects involved.

Decisions:The individual must make sound decisions, and demonstrate a commitment to those decisions. The individual must also be able to escalate out-of-scope problems to more experienced team members. The individual must accurately represent the program in interactions with external customers, sponsors, and the public.

Supervisory Responsibilities: The individual may be responsible for managing student interns.

 

Job Functions or Responsibilities:

60%     Develop, deploy, and transition technical solutions for insider threat prevention, detection, and response.

15%     Participate in research into cutting-edge strategies for insider threat data collection and analysis techniques.

10%     Design and develop training materials for insider threat program practitioners.

10%     Contribute to conferences and meetings; participate in marketing calls and technical exchanges with clients; give talks and lectures as appropriate; participate on working groups for subjects of interest.

5%       Provide assistance and input to other teams and projects within the SEI.

100% TOTAL EFFORT

 

Organizational Chart: CERT Program, Director < Risk and Resilience Directorate, Technical Director < Enterprise Threat & Vulnerability Management, Technical Manager < Technical Solutions, Technical Team Lead < Associate Cyber Security Engineer.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

29 Sep
2016
Senior Cyber Security Researcher - 2004139
Pittsburgh, PA

Position Summary: The CMU/SEI Forensic Operations and Investigations team is a leading edge analytical resource focusing on critical U.S. Government (USG) needs.  For the past 10 years, CERT has provided analytical and operational support to high-profile investigations including numerous activities of national or international significance. Through this work the FOI can see the current limitations of digital analysis and incident response in the field first hand. Combining applied research with the unique talents, operational experience, research capabilities, and the vast knowledge base of Carnegie Mellon University, FOI is unmatched in its ability to develop new tools and methods to address cyber security limitations and critical gap areas.

This individual will serve in a multi-disciplinary role providing ongoing support to federal law enforcement, defense agencies, and the national intelligence community. As a member of the FOI team this candidate will provide support to on-going operations in the areas of incident response and investigation, full-spectrum digital forensics and applied research in emerging areas of cybercrime. At times, this position will require the team member to develop and deliver training modules related the aforementioned domains.

The successful candidate must have proven computer forensics experience in multi-jurisdiction criminal investigations, be self-directed, have a track record of creating interdisciplinary approaches to problem solving, and demonstrate exceptionally strong presentation and instructional skills. The candidate must also be able to interact with clients and staff of all levels in a highly professional and competent manner.

 

Minimum Qualifications and Requirements:

Education/Training: BS Computer Science, Information Security or other related discipline and a minimum of ten (10) years of related experience; or equivalent combination of training and experience.

Licenses: Certified Encase Examiner, ACE. CISSP, GIAC, SSCP, OSCP or other related/relevant certifications preferred.

Experience:  At least four or more (4+) year’s relevant experience in computer forensics, to include field and laboratory collection/imaging, analysis, with prior court room testimony preferred.  Technical experience required with host and network based forensics investigations and tools, analysis of Microsoft Windows, Unix/Linux and Mac OS operating systems, and removable media data recovery.

Skills/Abilities: Candidate must be able to prioritize workload and complete deliverables on time, have good technical problem-solving skills, have strong analytical and information organization skills, have excellent oral and written communication skills, and strong technical teaching skills.  Candidate must be skilled in instructional design, course development, and evaluation techniques.  Candidate must be able to multi-task and work effectively with multiple project teams and sponsors/customers. Technical proficiency with operating systems and detailed knowledge of network protocols are required.

Mobility: Sedentary in an office setting with some mobility, i.e., able to travel to various locations within the SEI and CMU community as well as travel to customer sites.

Environmental Conditions: Close contact with CRT for long periods of time.

Mental:  Ability to pay close attention to detail, meet deadlines, work under pressure, and communicate effectively.

Other:  U.S. Citizenship is required.  Applicants selected will be subject to a security investigation and must meet eligibility requirements for access to classified information.

 

Preferred Qualifications and Requirements

Education/Training: BS in Computer Science, Information Security or other related discipline with a minimum of ten (10) years of applicable experience; MS in Computer Science, Information Security or other related discipline with a minimum of eight (8) years of applicable experience; PhD in Computer Science, Information Security or other related discipline with a minimum of five (5) years of applicable experience; or equivalent combination of training and experience.

Experience: Experience with state or federal law enforcement organization; operational knowledge of recently enacted state and federal laws and procedures relating to computer forensics investigations; coordination with criminal investigators, including courtroom testimony. 

Skills/Abilities:

  • Penetration Testing

  • Information and network security including experience with IDS/IPS

  • Knowledge of common vulnerabilities, exploits and mitigations

  • Digital Forensics (host, network and mobile devices)

  • Incident Response

  • Ability to research and characterize security threats including defining appropriate countermeasures

  • Hardware or software reverse engineering for either vulnerability discovery/assessment or malware analysis

  • Virtual infrastructure and hypervisors

  • Experience with common security controls including firewalls, proxies, IDS/IPS, Web Application Firewalls

  • Technical knowledge of fundamental Internet protocols, services, and technologies to include HTTP, TLS, DNS, SMTP, TCP/IP, ICMP, AJAX, JSON, REST

  • 2+ years with a scripting language including SQL, Python, Ruby, JavaScript, Perl, PHP and/or shell scripting

 

Accountability:  The incumbent is accountable for the definition, creation, and maintenance of final deliverables and products.

Direction: The incumbent is expected to act independently using CMU and SEI defined policies, practices, and procedures.

Decisions:  Required to design, develop, pilot and deliver products.  Required to accurately represent NSS and its technical work in interactions with customers, sponsors, and the public.

Supervision:  Contributes to hiring decisions of program staff; mentors junior staff; supervises student interns.  The experienced candidate may perform project management responsibilities.

 

Job Functions or Responsibilities:

55%     Operational support for SEI customers.

20%     Perform applied research in emerging areas of digital forensics.

15%     Deliver technical and management training to customers.

5%       Mentor, guide and interact with team and other staff.

5%       Contribute to the research and technical agendas of the FOI. 

 

Organizational Chart:  CERT Division Director, Technical Director, Cyber Security Solutions > Deputy Director, Cyber Security Solutions > Technical Manager, Forensic Operations and Investigations > Senior Cyber Security Researcher

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

15 Aug
2016
Information System Security Manager - 2003860
Arlington, VA

This position is located in Arlington, VA.

Position Summary:  The Information System Security Manager is a hands-on information system security role within the Office of the CIO Information Assurance (IA) team of the Software Engineering Institute (SEI) that operates, monitors, and maintains accredited information systems. This is an opportunity for a cleared IA professional in the Arlington VA area with strong organization and communication skills and working experience with modern Windows system administration tools and operating techniques in a Windows-based accredited network. This position is responsible for facilitating and assuring that information systems in the Arlington VA office remain complaint with DoD and other USG regulations. The position works closely with SEI groups and outside sponsors to coordinate the certification and accreditation of accredited information systems.

 

Minimum Qualifications and Requirements:

Education/Training: Bachelor’s degree in Computer Science, Information Technology, or related field, or equivalent combination of training and experience. Current Microsoft server certifications; one or more of MCITP (Server & Client), MCSA, MCSE, etc.

Licenses:   One or more of: CAP, CASP CE, Security+CE, SSCP, GSEC, CISM

Experience: Five or more (5+) years of system and network administration experience using modern system administration tools and operating techniques in an accredited production Microsoft Windows infrastructure. Prior experience as an ISSO / ISSM (IAO/IAM) in a small to medium-scale classified enclave. Experience as a system / network administrator for services under government cognizance (e.g., DISA, DSS); knowledge of the DOD STIGs and their application in establishing and operating information systems. Experience confirming audit records and STIG compliance for systems in an accredited Microsoft Windows infrastructure.

Skills/Abilities: Problem solving skills. Demonstrated knowledge of Windows operating system commands/utilities; demonstrated knowledge of system administration tools and processes such as those used to manage software, Group Policy Objects, and other aspects of Active Directory; demonstrated knowledge of server and network problem resolution based on examination of events/alerts and system monitors/logs.

Mobility:  Normally sedentary but some business travel required (e.g., training, other SEI locations, etc.) Computer hardware installation and configuration required on an infrequent basis involving objects typically <= 30 pounds (heavier objects with assistance).

Environmental Conditions: Normal office condiditons, close contact with computer displays for prolonged periods of time.

Mental: Ability to identify, isolate and resolve systems problems. Communicate the nature of problems to different parties (e.g., system / network administrators, IA professionals, IT user support, etc.) to resolve technical issues, sometimes under pressure. Temperament and maturity to self-motivate and prioritize tasks with input from a remotely located manager.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance. Must meet and maintain DoD 8570-M readiness requirements within six (6) months of employment. Additional work hours (weekend and evening hours) may be required on an infrequent basis. May be required to stay at or return to work during incidents and/or emergencies to perform duties as requested.

 

Preferred Qualifications and Requirements:

Licenses:   One or more of the following: Active CISSP (or Associate), GSLC, CISM.                                                                                            

Experience:  ICD-501/503 experience; prior use of the ACAS tool chain, Security Content Automation Protocol (SCAP) validation tools, awareness of NISPOM IS-relevant rules, etc.

 

Accountability:  Ensures server(s) and client stations are operating efficiently and resolves issues. Verifies that accredited systems maintain their prescribed configuration and addresses/reports deviations from same immediately.  Recommends and performs modifications to enhance server/service performance and reliability.

Regularly communicates with the ISSO and ISSM as well as IT engineering group leaders in Pittsburgh to convey operational status information relevant to the services in scope.

Responsible for proper handling (e.g., safe storage, proper marking, approved destruction) of document and media used in the operation and maintenance of classified systems.

Responsible for providing information relating to equipment and facility needs each fiscal planning session to aid in budgeting expenses related to the operation of accredited systems in “closed” areas.

Participates in the development or revision of IS-specific security safeguards and local operating procedures to satisfy certification requirements. Works with the ISSM and ISSO in Pittsburgh to align policies to DC operations.

Direction:  Works under limited supervision from a remote manager as part of the OCIO IA team.

Expected to act independently to maintain and securely operate accredited systems with guidance from the lead ISSM, FSO, and OCIO senior management. Draws guidance from relevant operational security guidelines / manuals, turning to the lead ISSM for clarification when needed.

Most work is performed independently, or in concert with the lead ISSM and appropriate IT staff.

Decisions: Must be able to identify user and systems issues and resolve trivial issues independently. Information Security issues and complex operational problems are handled in concert with the ISSO, ISSM and appropriate IT or Security staff.

Supervisory Responsibilities:  No regular staff supervisory responsibilities.

Regularly inspects accredited systems and may task other IT personnel in order to address infractions or post-audit POA&M issues.

Will assist in the training process for new staff and users of accredited systems.

 

Job Functions or Responsibilities:

20%   Installs, maintains, configures and upgrades accredited servers, workstations and network devices in accordance with most current STIG documents. Assists users to resolve problems related to closed area systems and services.

15%   Reviews server logs directly or with analysis tools to discern operational anomalies, including operational threats (e.g., resource contention/exhaustion) and security concerns; addresses and/or reports these to IA colleagues or IT as appropriate.

15%   Reports on the operational status of accredited information systems based on reviews and scans to accrediting agencies, possibly through established channels such as ACAS, HBSS, etc. Reporting is coordinated with the IA team in the Pittsburgh office.

10%  Performs C&A duties including submission of accreditation documents. Drives IS related self-inspection activities and C&A / CCRI preparations. Primary interface to the local DSS IS representative.

10%  Performs classified IS user indoctrination briefings and manages IT accounts / credentials of classified systems, including required recordkeeping (account lifecycle, DoD IAA training status, policy acknowledgements, etc.).

5%   Functions as the secondary COMSEC custodian for the SEI Arlington (a/k/a DC) office responsible for device inventory, key management and loading, etc.

5%   Supports the FSO to prepare for traditional security inspection activities, complete self-inspections, etc.

5%   Performs limited FSO or CSSO duties in a backup capacity as directed.

Secondary Functions

10%    Other IT / IA related duties as assigned by the OCIO.

5%    Training and professional development to keep current with new technologies and regulations.

100% Total Effort

 

Organizational Chart:  CIO < Deputy CIO < Information System Security Manager

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

16 Jun
2016
Cybersecurity Risk Management Technical Manager - 2003362
Pittsburgh, PA or Arlington, VA

Position Summary: The CERT Program is part of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University with offices in Pittsburgh, Pennsylvania and Arlington, Virginia. The CERT Program engages in cutting-edge research, development, testing, and evaluation to improve the state of cybersecurity. As Cybersecurity Risk Management Technical Manager, you will lead a team of technical staff in developing and transitioning cybersecurity capabilities to both government and the private sector with a focus to benefit the US Department of Defense (DoD). 

You have both a breadth and diversity of experience with applied research, technology, information assurance, risk management, and technology lifecycle in DoD/Government domains. You are considered an expert source in risk management for your team, and you continue to acquire and expand your knowledge. You enjoy spending time with customers and practitioners to understand their problems and find innovative solutions.

You know how to lead teams (both co-located and geographically dispersed) of senior level engineers and complex projects – to supervise and review their work products, to guide their career paths, and to ease administrative burdens so that they can achieve jointly-developed technical goals. You know how to identify and propose new business development opportunities.  You know how to manage a diverse portfolio of work products and customers. You also bring advanced problem-solving and consulting skills in your role as a conduit and representative of the SEI with the community. You enjoy presenting to groups, publishing written works, and teaching/training others, and as a member of the Carnegie Mellon University community, you will have the opportunity to work with world-renowned faculty members and experts in cybersecurity.

As a member of our management team, you work with your Director and other Technical Managers to develop a Directorate-wide strategy, then you roll up your sleeves to develop and execute an implementation plan for your team to meet these goals, thereby assessing and improving the cybersecurity posture of the DoD, US Federal Government, Critical Infrastructure, and Industry.
 

Minimum Qualifications and Requirements:

Education/Training: BS in computer science, software engineering, information systems, or a related scientific/technical field with ten (10) years’ experience or equivalent combination of training and experience.

Experience:  Familiarity with process improvement models that contain the essential elements of effective management, development, and acquisition processes for one or more disciplines (e.g. the SEI’s CMMI) and experience transitioning these models into organizational practice; three or more years of leadership experience with responsibility for project and budget management.

Skills/Abilities:

  • Consulting skills and experience.
  • Demonstrated ability to develop and deliver training courses.
  • Project management experience.
  • Leadership and mentoring skills.
  • Strong knowledge of cybersecurity standards and related bodies of practice.
  • Experience with DoD customers.
  • Background in process improvement and capability measurement.
  • Ability to collaborate with other team members to accomplish organizational goals.
  • Critical-thinking skills.
  • Excellent written and verbal communications skills.

Physical/Mobility: Primarily sedentary in an office setting with some mobility.  Ability to travel frequently to various locations within the SEI and CMU community, customer sites, conferences, and offsite meetings.

Environmental Conditions: Close contact with computer for extended periods of time.

Mental: Strong interest in the human, managerial, and technical aspects of cyber security is critical for this position as are these abilities: take or share leadership role in technical projects; work meticulously with careful attention to detail; meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to understand the big picture, direction, and goals of an effort; ability to develop and communicate innovative ideas; ability to demonstrate initiative and to quickly learn new procedures, techniques, approaches, etc.

Accountability: The individual will implement and participate in the planning and execution of projects leading to technical products and results. The individual will also contribute to project, department, and program objectives and planning document development. The individual will keep in confidence sensitive information such as customer processes, risks, vulnerabilities, and internal work products, whether for eventual public or private distribution.

Direction: The individual is expected to act independently using CMU, SEI, and CERT defined policies, practices, and procedures – within the scope of assigned work.

Decisions: The individual must make sound technical decisions with little supervision. The individual must accurately represent the program in interactions with customers, sponsors, and the public. The individual is expected to perform analysis on-site at customer locations and immediately assess potential vulnerabilities requiring further investigation.

Supervisory Responsibilities: This position could involve the training and oversight of the work of other staff members, graduate students, resident affiliates, visiting scientists, and independent contractors. Depending on research project or customer work plan, position may involve task leadership.

Other: Must have a strong interest in cyber security and critical infrastructure protection, applied research, and development. Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.


Preferred Qualifications and Requirements:

Education/Training: MS in computer science, software engineering, information systems, or a related scientific/technical field with eight (8) years’ experience; PhD in computer science, software engineering, information systems, or a related scientific/technical field with five (5) years’ experience, or equivalent combination of training and experience.

Licenses: CISSP, CISM, GIAC, or similar; certifications from the audit discipline (such as CISA) are also acceptable.

Skills/Abilities: In addition to the minimum skills/abilities above, preferred skills/abilities include: demonstrated ability to develop and deliver coursework and training.


Job Functions or Responsibilities:

30%    Manages team to effectively implement and accomplish the SEI Program Plan, the CERT Division strategic plan, and the directorate strategic plan. Sets goals and objectives and manages operational and functional business activities. Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).

30%   Provides guidance to and monitors the success of team/technical leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility. Provides oversight of team/technical leads and their supervisory responsibilities of technical staff. Conducts performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff for the CRM team.

20%   Sets technical direction for team. Leads strategic planning process and contributes to the development of the CRR, CERT, and SEI strategic and program plans. Ensures annual update of plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy. Articulates vision for internal and external audiences.

10%   Identifies opportunities for new technical projects and manages start-up of new, high-priority technical areas of work. Works with Technical Director and business management personnel to develop and implement a funding and transition plan for new work areas.

10%   Directs organizational effectiveness and staff training and development plans. Identifies operational success measures and process improvements. Leads corrective actions.

TOTAL 100%


Organizational Chart: Director CERT Program < Technical Director, Cybersecurity Risk & Resilience Directorate < Technical Manager, Cybersecurity Risk Management

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran

 

18 May
2016
Security Operations Technical Manager - 2003124
Pittsburgh, PA

Position Summary: The CERT Program is a world-class program within the SEI, a federally funded research and development center at Carnegie Mellon University in Pittsburgh, Pennsylvania. The CERT Program engages in cutting-edge research and development and develops and transitions disciplined approaches to improve the survivability and resiliency of the US Department of Defense, US Intelligence Community, federal civilian agencies, private sector organizations and their networked information systems. CERT supports government customers by developing and transitioning cutting-edge analysis techniques and tools, providing strategic advisement, and supporting tactical operations.

CERT is seeking a dynamic Security Operations Technical Manager (TM) who will lead, shape and manage the growth of a cutting edge security operations program. This candidate will be able to reason about complex problems, be an innovator, and a leader.

This candidate must be able to develop and execute a technical agenda and strategic roadmap to continually improve the state of the art and practice of Security Operations and Incident Management/Response. The TM will need to be able to communicate this technical vision and be capable of building consensus within the team and to maintain a successful culture built on high-quality and impactful customer work.

This approximately 20-person Security Operations team works from the SEI’s Pittsburgh and Arlington offices, and is embedded at USG facilities in the Washington DC-Baltimore area.  The position of technical manager is responsible for all aspects of developing and executing the body of work to include setting the technical direction; managing financials; business development; and personnel issues.

This role reports to the Director of Monitoring and Response, a directorate in the CERT Division.

 

Minimum Qualifications and Requirements:

Education/Training:  BS in a Computer Science or related scientific/technical field with ten (10) years’ experience, or equivalent combination of training and experience.

Experience:  Experience listed above should include:

  • Work in cyber security or intelligence operations;
  • Prior responsibility managing a team comprising a total of at least 10 individuals with commensurate personnel and financial authority.
  • These individuals should have had cyber operations roles.

Skills/Abilities: Working knowledge of:

  • Current security challenges and threats faced by a subset of the following audiences: USG intelligence, defense, law enforcement, civilian departments, and critical infrastructure.
  • USG mission’s areas/owners in cyber security.
  • Community best practices in cyber operations and associated tools/techniques.
  • Understanding of existing standards and models for security operations, incident response, intrusion analysis and cyber threat intelligence.
  • Internet protocols, operations, and governance.
  • International policies, frameworks, treaties and conventions.

Ability to:

  • Set and implement a strategic direction for a technical area and group.
  • Codify operational experience into best practices.
  • Conduct technical project management.
  • Brief strategic and technical topics to senior management and non-technical audiences;
  • Sustain a team with business development activity.
  • Foster professional growth and develop technical/professional leadership capabilities in technical staff.

Physical Mobility: Primarily sedentary in an office setting with some mobility.  Requires travel to various domestic locations within the SEI and CMU community to include the SEI Arlington/Pittsburgh office; sponsor sites; conferences; and offsite meetings with routine frequency (up to one 2 day trip every week).

Environmental Conditions: Normal office conditions; close contact with computer display for extended periods of time.

Mental:  The ability to: work meticulously with careful attention to detail; meet deadlines while working on multiple tasks – sometimes under pressure and with shifting priorities; deal collaboratively, diplomatically, and successfully with customers, co-workers and other professional colleagues, managers, and staff; ability to grasp the big picture, direction, and goals of an effort; develop and communicate innovative ideas; and excellent oral and written communication skills.

Other: Candidates will be subject to a background check and must be eligible to obtain and maintain a Department of Defense security clearance.

 

Preferred Qualifications and Requirements:

Education/Training: MS in a related technical field with ten (10) years of experience, or equivalent combination of training and experience.

Experience:  Experience listed above should include:

  • Working for or supporting the USG.
  • Supporting multiple sponsors/customers.
  • Supporting customers in an operational security environment such as incident response, intelligence, or a security operations center.
  • Supporting elements of the critical infrastructure sectors or international NCSIRTs.
  • Leading community building activities in the critical infrastructure, NCSIRT, or USG space.
  • Establishing and defining processes for operational security organizations, and codifying best practices from community and operational experience.
  • Leading workforce/capacity building projects.
  • Prior responsibility in managing a team of 15-20 individuals with commensurate personnel and financial authority.
  • Participation in public and closed community security forums through activities such as publication, presentation, collaborative security operations, and collaborative research.
  • Experience leading work internationally.

Skills/Abilities:

  • Practical experience leading, defining, or applying TTPs for cyber operations; 
  • Working knowledge of secure systems and network architecture practices.

 

Accountability:  This position is accountable for the specification and execution of all any Incident Analysis technical area work plans and a subset of the SEI operational plan.

Direction:  The individual in this position is expected to act autonomously using CMU, SEI, and CERT, defined policies, practices, and procedures.  Additionally, this position will define those set for their technical area and influence those set for CERT.

Decisions:  The individual in this position is expected to make strategic choices about the direction of the technical area that will be distilled into a technical agenda funded by a defined set of existing or new customers and implemented by a team hired to support the specifics tasking.

Supervisory Responsibilities:  This position has ultimate supervisory responsibility over all staff in the technical area to include hiring, performance reviews, salary adjustments, task assignment, and setting the tone and culture of the group.

 

Job Functions or Responsibilities:

30%     Manages group to effectively implement the SEI and task order work plans.  Sets goals and objectives and manages operational and functional business activities.   Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).

30%     Provides guidance to and monitors the success of team leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility.  Provides oversight of team leads and their supervisory responsibilities of technical staff and conducting performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff.

20%     Sets technical agenda of the technical area.  Leads planning process and contribute to the development the CERT strategic plan.  Ensures regular update of technical area’s plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy.  Articulates vision for internal and external audiences.

10%     Identifies opportunities for new technical projects and manages start-up of new, high-priority technical programs of work. Works with Technical Director of Response and Monitoring to develop and implement a funding and transition plan for new work areas.

10%     Directs organizational effectiveness and staff learning and development plans. Identifies operational success measures and process improvements.  Leads corrective action.

100% Total Effort

 

Organizational Chart: Division Director, CERT < Monitoring and Response Technical Director < Security Operations Technical Manager.

 

Carnegie Mellon University is an EEO/Affirmative Action Employer – M/F/Disability/Veteran.

Apply for Positions

To apply for open positions visit Careers at the Software Engineering Institute.

Search for Positions

Interested in working with us?

Search positions

Accessibility Needs for Applicants, Students and Visitors

Carnegie Mellon University makes every effort to provide physical and programmatic access individuals with disabilities. If you require an accommodation to participate in any part of the employment process, please contact Disability Resources by emailing access@andrew.cmu.edu or calling 412-268-3930.

Carnegie Mellon University considers applicants for employment without regard to, and does not discriminate on the basis of, gender, race, protected veteran status, disability, or any other legally protected status.