logo

View all jobs

(VV) Applied Research Mathematician (TS/SCI w/ FS Poly)

Columbia, MD · Information Technology
The Kenjya-Trusant Group is seeking an Applied Research Mathematician to support a client contract in the Annapolis Junction, MD area.

SECURITY REQUIREMENT: TS/SCI Full Scope Poly

JOB DESCRIPTION:
  • Plan, develop, coordinate, control, and/or perform work involving the development and application of methods for the analytic solution of problems in various subject matter fields, where the exactitude of the relationships, the rigor and economy of the operations, the use of mathematical methods and reasoning, and the logical necessity of results are the controlling considerations.

REQUIRED CAPABILITIES:
  • The Contractor shall conduct technical problem solving and technical design:
    • Analyze data using mathematical/statistical methods.
    • Analyze new algorithms and protocols.
    • Analyze problems to determine technical solutions.
    • Apply mathematical or computational methods and lines of reasoning.
    • Create computer algorithms, data models, and protocols.
    • Decide what procedures will be required to solve technical problems.
    • Develop mathematical or computational methods and lines of reasoning.
    • Identify new applications of known techniques.
  • The Contractor shall use algorithms:
    • Use concepts and procedures for applying algorithm design techniques (e.g., data structures, dynamic programming, backtracking, heuristics, and modeling) to design correct, efficient, and implementable algorithms for real-world problems.
  • The Contractor shall develop cryptanalytic attacks:
    • Develop attacks to exploit encrypted communications using principles and methods of cryptanalysis.
  • The Contractor shall use cryptographic methods:
    • Apply principles and methods of cryptology to algorithms to solve cryptographic problems.
    • Use principles and methods of cryptology (e.g., codebooks, commercial cipher systems, public key cryptography, key distribution management systems, data integrity, authentication, quantum crypto, resisting differential power analysis, power analysis).
  •  The Contractor shall use crypto mathematics:
    • Apply advanced mathematical techniques and methods to support cryptanalytic problems (e.g., cryptanalysis, network analysis or exploitation).
  • The Contractor shall use linear algebra:
    • ​​​​​​​Apply principles and methods of linear algebra (e.g., vector spaces, matrices, matrix manipulations) to solve complex problems.
  • The Contractor shall use probability:
    • ​​​​​​​Apply the mathematical principles, combinatorial methods or elicitation techniques to determine or calculate the likelihood of outcomes.
    • Quantify the likelihood of an event's occurrence.
  • The Contractor shall use statistics:
    • Apply data-analytic techniques to analyze, visualize, and summarize sample data from populations.
    • Draw inferences regarding populations based on results from sample data.
ADDITIONAL REQUIRED TASKS:
  • The Contractor shall analyze and produce intelligence information:
    •  Use critical thinking and reasoning to make analytic determinations.
    • ​​​​​​​Critically evaluate and select the appropriate formal methods of analysis.
    • Select, build, and develop query strategies against appropriate collection databases.
    • Evaluate information for accuracy, quality, completeness, relevancy and timeliness.
    • Identify and evaluate assumptions underlying information or data.
    • Identify relationships, trends, and patterns in, or draw conclusions from, information.
    • Merge information gathered from different authorities.
    • Monitor open and classified sources for useful information.
    • Use knowledge of customer requirements to analyze and process intelligence information.
    • Identify and analyze anomalous data (including metadata).
    • Conduct, evaluate or participate in research.
    • Be aware of intelligence reporting policies and procedures, such as dissemination practices, and legal authorities and restrictions.
    • Provide feedback to tool developers.
  • The Contractor shall create and maintain documentation of their analysis, tradecraft, research and knowledge.
  • The Contractor shall follow oversight and compliance:
    • ​​​​​​​ Comply with legal and regulatory policies and procedures required for the selector targeting, collection, processing, retention, and dissemination of information.
  • The Contractor shall use NSA/CSS Mission/Policies/Directives:
    • Apply NSA/CSS policies and directives.
  • The Contractor shall use information security:
    • Apply policies, procedures, and requirements for ensuring information security.
  • The Contractor shall acquire/share job knowledge/skill:
    • ​​​​​​​Learn and apply new technologies and work processes.
  • ​​​​​​​The Contractor shall train government and other Contractor personnel:
    • Provide formal and informal analysis tradecraft training in all forms including on- the-job training, creation of video training artifacts, conducting formal and informal training in physical or virtual classroom settings.
  • The Contractor shall work with others:
    • ​​​​​​​Provide customer service.
    • Provide timely and accurate responses to requests for assistance, information, products, or services.
    • Work with others across analysis disciplines in order to produce the best possible results.
QUALIFICATIONS:
  • All experience and education must be in a technical field directly related to the labor category and all degrees will be from accredited colleges or universities
  • Level 4
    • ​​​​​​​Eleven (11) years minimum experience and a Bachelor's Degree
    • Nine (9) years minimum experience and a Master's Degree
    • Seven (7) years minimum experience and a Doctorate Degree
  • Level 3 
    • Eight (8) years minimum experience and a Bachelor's Degree 
    • Six (6) years minimum experience and a Master's Degree
    • Four (4) years minimum experience and a Doctorate Degree
  • Level 2
    • Five (5) years minimum experience and a Bachelor's Degree
    • Three (3) years minimum experience and a Master's Degree
    • Two (2) years minimum experience and a Doctorate Degree
  • Level 1
    • Two (2) years minimum experience and a Bachelor's Degree
​​​​​​​

THE KENJYA-TRUSANT GROUP, LLC is a Service-Disabled Veteran-Owned Small Business that was established in 2015 as a merger between The Kenjya Group, Inc. and Trusant Technologies, LLC. Our mission is to implement, support and protect the nation’s advanced technology systems, business processes and high-technology facilities. Working with the Department of Defense, Department of Homeland Security, the Intelligence Community, state and local governments, and commercial clients, Kenjya-Trusant provides cyber protection, information technology, engineering, construction management and acquisition support services. We are a small company with big company benefits, including Health, Dental, Vision, 401K, Bonus Potential, Flexible Spending Account, Life Insurance, Short- and Long-Term Disability, Paid Time Off, and a culture of teamwork and continuous learning. Come grow with us!
 
Powered by