search
yourdomain > Fredericksburg > computer/technical > Vulnerability Security Researcher

Vulnerability Security Researcher

Report Ad  Whatsapp
Posted : Friday, April 19, 2024 06:36 PM

Summary The FBI is recruiting a Vulnerability Security Researcher to support mission critical cyber operations.
As a Vulnerability Security Researcher, you will specialize in the design, development, integration, and deployment of cutting edge tools and systems to support cyber operations and intelligence activities.
Leveraging advanced knowledge and tradecraft with regards to computer and network security, you will produce creative, innovative, and elegant solutions to some of the toughest challenges.
This job is open to Career transition (CTAP, ICTAP, RPL) Federal employees who meet the definition of a "surplus" or "displaced" employee.
Federal employees - Competitive service Current or former competitive service federal employees.
Federal employees - Excepted service Current excepted service federal employees.
Individuals with disabilities Internal to an agency Current federal employees of this agency.
Military spouses The public U.
S.
Citizens, Nationals or those who owe allegiance to the U.
S.
Veterans Clarification from the agency All U.
S.
Citizens.
Duties GS 11: Develop bespoke capabilities and mobile applications needed to conduct the FBI's Computer and Network Exploitation (CNE) mission.
Partner with mission teams to build unique solutions for iOS, Android and MacOS partners.
Evaluate and meet vendors associated with computer network exploitation and defense to help identify potential tools to use for the unit's mission.
GS 12: Research and development of mobile application vulnerabilities through reverse engineering.
Perform application level Pen Testing and forensics analysis.
Requirements Conditions of Employment Must be a U.
S.
citizen Must be able to obtain a Top Secret-SCI clearance 5% to 10% travel is required ALL applicants must verify completion of the basic education requirement by submitting a copy of college transcripts by the closing date of the vacancy announcement.
Qualifications Please make sure your specialized experience/requirement(s) can be identified in your resume.
Applicants must meet the qualification requirements by the closing date of this announcement.
Specialized Experience (SE): GS-11: Applicant must possess at least one (1) year of specialized experience equivalent to the GS-9 grade level.
SE is defined as follows: Experience in Software Engineering with a focus on mobile application development.
Experience in research and development of application security for iOS and Android applications.
Experience with Android, iOS, and/or MacOS systems.
GS-12: Applicant must possess at least one (1) year of specialized experience equivalent to the GS-11 grade level.
SE is defined as follows: Experience analyzing problems and developing solutions involving mobile hardware and software.
Experience demonstrating the ability to reverse engineer malware, android and iOS applications.
Education All degrees must be from an accredited college or university.
Education may be substituted for specialized experience as follows: GS-11: Applicant must have a Ph.
D.
OR equivalent doctoral degree OR 3 full years of progressively higher level graduate education leading to such a degree OR LL.
M.
, if related.
Positive Education Requirement This position has a specific education requirement; all applicants must verify completion of this basic educational requirement by submitting a copy of their college transcripts by the closing date of the vacancy announcement.
BASIC REQUIREMENTS: All applicants must have a bachelor's degree in Computer Science or bachelor's degree with 30 semester hours in a combination of mathematics, statistics AND computer science, 15 of the 30 semester hours MUST have been in any combination of statistics and mathematics that included differential and integral calculus.
Courses designed to provide an introduction to computer science techniques and methodologies are acceptable; courses in teaching elementary, business or shop mathematics are NOT acceptable.
Education completed in foreign colleges or universities may be used to meet the above requirements provided you can show foreign education is comparable to that received in an accredited educational institution in the United States.
Additional information Official Position Title: Computer Scientist Incentive: A recruitment incentive has been authorized for this particular position in the Operational Technology Division, Remote Operations Unit.
As the federal agency whose mission is to ensure the fair and impartial administration of justice for all Americans, the Department of Justice is committed to fostering a diverse and inclusive work environment.
To build and retain a workforce that reflects the diverse experiences and perspectives of the American people, we welcome applicants from the many communities, identities, races, ethnicities, backgrounds, abilities, religions, and cultures of the United States who share our commitment to public service.
Keywords: Software development, Python, iOS, Android, Java, SWIFT, C++, C, Agile/Scrum, ARM, Vulnerability research Benefits How You Will Be Evaluated You will be evaluated for this job based on how well you meet the qualifications above.
Your application will be evaluated and rated under the FBI's Candidate Rating Procedures.
Your resume and supporting documentation will be used to determine whether you meet the job qualifications listed in this announcement and will be compared to your responses to the online assessment questionnaire.
High self-assessment in the vacancy questions that is not supported by information in your resume, and/or supporting documents may eliminate you from Most Competitive status.
Your application will then be placed in one of three categories: Most Competitive, Competitive, or Least Competitive.
Names of candidates in the Most Competitive category will be sent to the hiring official for employment consideration.
Veterans' preference will be applied.
All applicants will be rated on the following Competencies: Innovative Thinking Interpersonal Ability Software Development/Software Engineering Required Documents To apply to this position, interested applicants must provide a complete application package by the closing date which includes: Your resume, specifically noting relevant work experience and associated start and end dates A complete assessment questionnaire Other supporting documents (if applicable): College transcripts, if qualifying based on education or if there is a positive education requirement Notification of Personnel Action, SF-50; not applicable to current FBI employees Memorandum for Record (MFR), Please see Additional Information Most recent Performance Appraisal; not applicable to current FBI employees Veterans: DD 214; Disabled Veterans: DD 214, SF-15, and VA letter dated 1991 or later Documents that were uploaded one or more years ago will need to be uploaded again.
Although an applicant may see these documents within their current profile, the HR Specialists may not have access to view them.
All applicants are being asked to upload another copy (if applicable) to ensure the staffing units can review the complete application.
How to Apply To apply for the Vulnerability Security Researcher position, please click here.
Agency contact information Felisa Wainwright Phone (202) 324-7138 Email ffwainwright@fbi.
gov Address Federal Bureau of Investigation 935 Pennsylvania Ave, NW Washington, DC 20535 US Next steps Once your complete application is received we will conduct an evaluation of your qualifications and determine your ranking.
The Most Competitive candidates will be referred to the hiring manager for further consideration and possible interview.
You will be notified of your status throughout the process.

• Phone : (202) 324-7138

• Location : Quantico, VA

• Post ID: 9132488853


Related Ads (See all)


auburn.yourdomain.com is an interactive computer service that enables access by multiple users and should not be treated as the publisher or speaker of any information provided by another information content provider. © 2024 yourdomain.com