OPS Consulting is seeking a Cryptologic Computer Scientist to work in Annapolis Junction, MD. Responsibilities: The Cryptologic Computer Scientist will design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework. This position will requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computerarchitecture, discrete … math, programming language theory, and data structures). Required Qualifications: Level 3: 8 years of relevant experience in the following areas: computer system research, simulation/model development and prototyping, software design, programming, computational science, algorithm analysis, design, and reverse engineering/designing/developing to include hardware and/or software. A Bachelor's degree in Computer Science or related fields such as (Engineering, Mathematics, Information Technology, or Information Systems) only if the following foundational Computer Science areas are met: algorithms, computerarchitecture, programming methodologies, data structures, logic and computation, and advanced mathematics. Level 4: 11 years of relevant experience in the following areas: computer system research, simulation/model development and More ❯
community. The successful candidate will have experience of supporting desktop and mobile technologies in the work place. You will have excellent problemsolving skills and an in-depth knowledge of computerarchitecture, windows operating systems, directory services and configuration management. Operating as part of a small team, you must be able to work without supervision and be able to … experience combined with a vocational IT qualification ITIL Foundation Certificate (to be passed within 12 months of appointment) Desirable Microsoft Certified Professional Certificate Knowledge Essential A good knowledge of computerarchitecture, Windows operating systems and office applications Data Protection and software licensing principals Directory Services/Administration Desirable ITIL Problem & Incident Management ITIL Configuration Management Desktop & application virtualisation More ❯
debugging tools to troubleshoot software implementation and ensure integrity of the software products. Experience with Windows Operating System and Microsoft Visual Studio is required. Qualifications We Prefer: Knowledge of computerarchitecture and computer hardware optimization techniques Knowledge of the development of software drivers for the operation of computer hardware interfaces Knowledge in common computer hardware … interface and data protocols such as TCP/IP or UDP Knowledge of Unified Modeling Language (UML) to visualize software architecture and design Knowledge of software development lifecycles, such as Waterfall and Agile Knowledge of Software Configuration Management principles Good written and interpersonal communication skills Additional Job Details: Pay Rate:- $70/hr.-$80/hr. Pay range offered More ❯
and transferable U.S. government issued security clearance is required prior to start date. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance. • Knowledge of computerarchitecture and computer hardware optimization techniques • Knowledge of the development of software drivers for the operation of computer hardware interfaces • Knowledge in common computer hardware … interface and data protocols such as TCP/IP or UDP • Knowledge of Unified Modeling Language (UML) to visualize software architecture and design • Knowledge of software development lifecycles, such as Waterfall and Agile • Knowledge of Software Configuration Management principles • Good written and interpersonal communication skills The Test Equipment Engineering (TEE) team within the Hardware Discipline Center is a multi More ❯
concurrently Troubleshoot software and test equipment instrumentation Work in a multidiscipline engineering team environment Develop and derive requirements for software products Additional Job Details: Qualifications We Prefer: Knowledge of computerarchitecture and computer hardware optimization techniques Knowledge of the development of software drivers for the operation of computer hardware interfaces Knowledge in common computer hardware … interface and data protocols such as TCP/IP or UDP Knowledge of Unified Modeling Language (UML) to visualize software architecture and design Knowledge of software development lifecycles, such as Waterfall and Agile Knowledge of Software Configuration Management principles Good written and interpersonal communication skills Equal opportunity employer as to all protected groups, including protected veterans and individuals with More ❯
concurrently Troubleshoot software and test equipment instrumentation Work in a multidiscipline engineering team environment Develop and derive requirements for software products Additional Job Details: Qualifications We Prefer: Knowledge of computerarchitecture and computer hardware optimization techniques Knowledge of the development of software drivers for the operation of computer hardware interfaces Knowledge in common computer hardware … interface and data protocols such as TCP/IP or UDP Knowledge of Unified Modeling Language (UML) to visualize software architecture and design Knowledge of software development lifecycles, such as Waterfall and Agile Knowledge of Software Configuration Management principles Good written and interpersonal communication skills Equal opportunity employer as to all protected groups, including protected veterans and individuals with More ❯
Design, develop, deliver and operate solutions to hard cryptologic computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicator, active penetration into target systems, knowledge discovery of passive and active systems, or other cryptologic computer science mission support. Requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, and data structure) are applied to each problem to provide state-of-the-art techniques, tools, and approaches. Degree must be in Computer Science, Computer Engineering, Electrical Engineering, Mathematics (including Applied Math); or a related field (i.e., other More ❯
Job Number: 133 Job Title: CRYPTOLOGIC COMPUTER SCIENTIST III Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job Location: Fort Meade MD Salary: 180K Background Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within a scientific framework Protection of critical networks, active systems warnings and … indicators, active penetration into target systems Knowledge discovery of passive and active systems, or other cryptologic computer science mission support Requirements Degree must be in computer science, computer engineering, electrical engineering, mathematics, or a related field Doctoral degree plus 4 years of relevant experience Master's degree with 6 years of relevant experience Associates degree with … years of in-depth relevant experience Requisite computer science skills such as operating systems, compiler theory, database theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, data structures Preferred Strong Python programming skills More ❯
Job Number: 382 Job Title: CRYPTANALYTIC COMPUTER SCIENTIST III (382) - MARYLAND - URGENT Job Type: Full-time Clearance Level: TS/SCI with POLY Work Arrangement: On-site Job Location: Fort Meade MD Salary: 124K-181K Background Relevant experience must be in a computer science area (i.e. theoretical or applied), simulation/model development, designing/developing/using …/evaluating mathematic models, methods, and/or techniques (e.g. algorithm or development) computation science, algorithm analysis and design, reverse engineering, and/or designing/developing computer and information systems, including engineering hardware and/or software Requirements Bachelor's degree in in computer science, computer engineering, electrical engineering, mathematics, or a related field with at … math classes (Calculus and above with 8 years of relevant experience, Associates degree with 10 years of in-depth relevant experience that is clearly related to the position Requisite computer science skills such as: operating systems, compiler theory, database theory, algorithm analysis, computerarchitecture, discrete math, programming language theory, data structures Preferred Strong Python programming skills More ❯
175k-$210k Certifications: (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Degree Type: Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following … foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming … computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). Years More ❯
insights Distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major 4 years' applicable experience with a PhD … master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant Experience: Relevant experience must be in computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis More ❯
polygraph is required • Eight (8) years of experience as a DNEA and a bachelors degree. A bachelors degree may be substituted for two extra years of experience. Degree in Computer Science or related fields (Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not … network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). (U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Experience: (U) Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course More ❯
and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Locations: MD, VA, GA, TX, OH, UT, HI, AK Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. REQUIRED EDUCATION & EXPERIENCE • Must possess an active TS/SCI clearance with polygraph • Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major • Relevant Experience: Relevant experience must be in … computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Mitigation: Identify and address technical risks and develop strategies to manage technical debt. Culture Building: Foster a culture of innovation, experimentation, and continuous learning. Cross-team Contributions: Participate in architecture discussions and support wider software development initiatives. User Support: Provide responsive support for urgent issues affecting system users. Role Requirements Technical Skills Core Requirements: 3+ years of experience in … Technical Expertise by Team Focus Embedded & Data Platform Team: Expertise in C and C++ development. Firmware development experience for embedded and IoT devices. API development experience. Strong understanding of computerarchitecture, operating systems, and device drivers. Proficiency in debugging firmware for microcontrollers and SoCs. Familiarity with IoT protocols (e.g., MQTT). Strong knowledge of communication protocols (TCP/ More ❯
Mitigation: Identify and address technical risks and develop strategies to manage technical debt. Culture Building: Foster a culture of innovation, experimentation, and continuous learning. Cross-team Contributions: Participate in architecture discussions and support wider software development initiatives. User Support: Provide responsive support for urgent issues affecting system users. Role Requirements Technical Skills Core Requirements: 3+ years of experience in … Technical Expertise by Team Focus Embedded & Data Platform Team: Expertise in C and C++ development. Firmware development experience for embedded and IoT devices. API development experience. Strong understanding of computerarchitecture, operating systems, and device drivers. Proficiency in debugging firmware for microcontrollers and SoCs. Familiarity with IoT protocols (e.g., MQTT). Strong knowledge of communication protocols (TCP/ More ❯
analyzes collection-related information to guide tasking, identify problems, and assist with collection management; and recognizes essential elements of information to enable endpoint opportunities. Relevant experience must be in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration … testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience). There are multiple levels available for the Digital Network … Years' related experience DNEA LEVEL 3: Bachelor's degree and 8 Years' related experience DNEA LEVEL 4: Bachelor's degree and 11 Years' related experience Degree must be in Computer Science or related fields (Engineering, Mathematics) Other degrees may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitectureMore ❯
insights distill, document, contextualize and share your findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. You'll Bring These Qualifications Education: Degree in Computer Science. Degree in related fields (e.g., Engineering, Mathematics) may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. 4 years' applicable experience with a PhD … years' applicable experience with a master's degree, OR 8 years' applicable experience with a bachelor's degree, OR 10 years' applicable experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance More ❯
ensuring data integrity, assessing its value, and evaluating data size and types. The role also entails collaboration with analytics for comprehensive data analysis and interpretation. The Level 2 Cryptologic Computer Scientist shall possess the following capabilities: The Cryptologic Computer Scientist will be able to Design, develop, deliver, and operate solutions to hard cryptologic computer science problems within … Associate's degree plus 7 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Degree must be in Computer Science (CS). Related fields (e.g., Engineering, Mathematics) may be considered relevant if the program contains, at minimum, a concentration of courses in the following fundamental CS areas: algorithms … computerarchitecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) or Information Systems (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major. More ❯
associate's degree plus 13 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to then position. Degree must be in Computer Science (CS). Related fields (e.g., Engineering, Mathematics) may be considered relevant if the program contains, at minimum, a concentration of courses in the following fundamental CS areas: algorithms … computerarchitecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and advanced mathematics (for example, calculus, discrete mathematics). Information Technology (IT) or Information Systems (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a CS major. Responsibilities include, but are not limited to … Relevant experience must be in a computer science area (i.e., theoretical or applied), designing/developing/using/evaluating mathematic models, methods, and/or techniques (e.g., algorithm development) to study issues and solve problems, engineering (electrical or computer), and/or high-performance computing. Experience in Endpoint and Malware Exploitation activities, strong dev skills with large More ❯
Level 4 Bachelor Degree with 11 years of experience. Other degrees may be considered relevant if programs contain a concentration of courses in the following foundational CS areas: algorithms, computerarchitecture (not network architecture), programming methodologies and languages, data structures, logic and computation, and advanced mathematics (for example, calculus, discrete mathematics). Certifications: 18 semester hours of … military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree (applicable to Level 1 - Level 4). Experience Requirements: Relevant experience requires aspects of Intelligence Analysis (e.g. target development, social network analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/… development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course More ❯
a team environment • Proficient technical writing and formal presentation experience • Ability to lead single- or multi-discipline teams of engineers • Project management experience • Bid and proposal experience • Knowledge of computerarchitecture and computer hardware optimization techniques • Experience with developing and implementing programming languages • Utilize existing designs as a starting point to interface with new units under test More ❯
a team environment • Proficient technical writing and formal presentation experience • Ability to lead single- or multi-discipline teams of engineers • Project management experience • Bid and proposal experience • Knowledge of computerarchitecture and computer hardware optimization techniques • Experience with developing and implementing programming languages • Utilize existing designs as a starting point to interface with new units under test More ❯
Proficient technical writing and formal presentation experience . • Ability to lead single- or multi-discipline teams of engineers . • Project management experience. • Bid and proposal experience . • Knowledge of computerarchitecture and computer hardware optimization techniques . • Experience with developing and implementing programming languages. • Utilize existing designs as a starting point to interface with new units under More ❯