logo

View all jobs

(VV) Cryptanalytic Computer Scientist (TS/SCI w/ FS Poly)

Columbia, MD · Information Technology
The Kenjya-Trusant Group is seeking a Cryptanalytic Computer Scientist to support a client contract in the Annapolis Junction, MD area.

SECURITY REQUIREMENT: TS/SCI Full Scope Poly

JOB DESCRIPTION:
  • The Contractor shall analyze and produce intelligence information:
    • Conduct analysis of metadata.
    • Analyze signals and/or cryptographic data.
    • Develop tools and techniques for analysis.
    • Manipulate information in mission relevant databases (for example converting data, generating reports).
    • Use knowledge of cryptanalysis to diagnose and exploit encrypted material.
  • The Contractor shall develop software and programming:
    • Design and develop analytics.
    • Evaluate or test computer applications or programs for usability in order to meet performance objectives.
  • The Contractor shall conduct technology problem solving and technology design:
    • Analyze data using mathematical/statistical methods.
    • Analyze new algorithms and protocols.
    • Analyze problems to determine technical solutions.
    • Apply mathematical or computational methods and lines of reasoning.
    • Create computer algorithms, data models, and protocols.
  • The Contractor shall use algorithms:
    • Use concepts and procedures for applying algorithm design techniques (e.g., data structures, dynamic programming, backtracking, heuristics, and modeling) to design correct, efficient, and implementable algorithms for real-world problems. 
    • Validate the correctness of the algorithm for the stated purpose.
  • The Contractor shall develop analytic tools:
    • Develop specialized tools and/or computer-based programs and scripts to process analytic problems.
  • The Contractor shall use analytics and tools:
    •  Apply specialized tools and computer-based programs to process data for analytic problems.
    • Use the principal methods and techniques of gathering intelligence information.
  • The Contractor shall conduct computer software engineering:
    • Analyze and understand legacy code.
  • The Contractor shall conduct computer/network security:
    • Use methods and applications of tools used for exploitation and analysis of computer systems and networks vulnerabilities.
  • The Contractor shall use statistics and math:
    • Use mathematics for obtaining, organizing, analyzing, interpreting, presenting, summarizing, and drawing conclusions from data.
ADDITIONAL REQUIRED TASKS:
  • The Contractor shall analyze and produce intelligence information:
    •  Use critical thinking and reasoning to make analytic determinations.
    • Critically evaluate and select the appropriate formal methods of analysis.
    • Select, build, and develop query strategies against appropriate collection databases.
    • Evaluate information for accuracy, quality, completeness, relevancy and timeliness.
    • Identify and evaluate assumptions underlying information or data.
    • Identify relationships, trends, and patterns in, or draw conclusions from, information.
    • Merge information gathered from different authorities.
    • Monitor open and classified sources for useful information.
    • Use knowledge of customer requirements to analyze and process intelligence information.
    • Identify and analyze anomalous data (including metadata).
    • Conduct, evaluate or participate in research.
    • Be aware of intelligence reporting policies and procedures, such as dissemination practices, and legal authorities and restrictions.
    • Provide feedback to tool developers.
  • The Contractor shall create and maintain documentation of their analysis, tradecraft, research and knowledge.
  • The Contractor shall follow oversight and compliance:
    •  Comply with legal and regulatory policies and procedures required for the selector targeting, collection, processing, retention, and dissemination of information.
  • The Contractor shall use NSA/CSS Mission/Policies/Directives:
    • Apply NSA/CSS policies and directives.
  • The Contractor shall use information security:
    • Apply policies, procedures, and requirements for ensuring information security.
  • The Contractor shall acquire/share job knowledge/skill:
    • Learn and apply new technologies and work processes.
  • ​​​​​​​The Contractor shall train government and other Contractor personnel:
    • Provide formal and informal analysis tradecraft training in all forms including on- the-job training, creation of video training artifacts, conducting formal and informal training in physical or virtual classroom settings.
  • The Contractor shall work with others:
    • ​​​​​​​Provide customer service.
    • Provide timely and accurate responses to requests for assistance, information, products, or services.
    • Work with others across analysis disciplines in order to produce the best possible results.
QUALIFICATIONS:
  • All experience and education must be in a technical field directly related to the labor category and all degrees will be from accredited colleges or universities
  • Level 4
    • ​​​​​​​Eleven (11) years minimum experience and a Bachelor's Degree
    • Nine (9) years minimum experience and a Master's Degree
    • Seven (7) years minimum experience and a Doctorate Degree
    • Thirteen (13) years minimum experience and an Associate Degree
  • Level 3 
    • Eight (8) years minimum experience and a Bachelor's Degree 
    • Six (6) years minimum experience and a Master's Degree
    • Four (4) years minimum experience and a Doctorate Degree
    • Ten (10) years minimum experience and an Associate Degree
  • Level 2
    • Five (5) years minimum experience and a Bachelor's Degree
    • Three (3) years minimum experience and a Master's Degree
    • Two (2) years minimum experience and a Doctorate Degree
    • Seven (7) years minimum experience and an Associate Degree
  • Level 1
    • Two (2) years minimum experience and a Bachelor's Degree
    • Four (4) years minimum experience and an Associate Degree
​​​​​​​

THE KENJYA-TRUSANT GROUP, LLC is a Service-Disabled Veteran-Owned Small Business that was established in 2015 as a merger between The Kenjya Group, Inc. and Trusant Technologies, LLC. Our mission is to implement, support and protect the nation’s advanced technology systems, business processes and high-technology facilities. Working with the Department of Defense, Department of Homeland Security, the Intelligence Community, state and local governments, and commercial clients, Kenjya-Trusant provides cyber protection, information technology, engineering, construction management and acquisition support services. We are a small company with big company benefits, including Health, Dental, Vision, 401K, Bonus Potential, Flexible Spending Account, Life Insurance, Short- and Long-Term Disability, Paid Time Off, and a culture of teamwork and continuous learning. Come grow with us!
 
Powered by