The mission demands that NSA "see" the world through a different lens than any other organization. Our Computer Scientists face technical challenges well beyond the wildest imaginations of most people. NSA's mission requires persistent engagement to anticipate and understand complex threats in real-time, on a global scale. From Counter-Terrorism to Combat Support to Cybersecurity, NSA's Computer Science community creates novel, cutting-edge solutions that advance science and underpin every aspect of our foreign intelligence and cybersecurity missions. Solving these extraordinary problems allows NSA to share solutions with the world by contributing to open source, licensing patents, and publishing technical papers.
A world-class Computer Science cadre at NSA is vital to the security of the nation. The standards of reliability, repeatability, scale, speed, and compliance that NSA hardware and software products must meet are daunting. Industry and academia change the question to one that can be answered; NSA must answer the question as is. The mission problems, questions, and threats fuel our constant drive for more robust solutions and the use of revolutionary technologies like artificial intelligence, machine learning algorithms, high performance computing, big data analysis, anticipatory algorithms predictive analytics, complex data modeling, advanced computing and network architectures, distributed systems and sensor networks, advanced systems and IT networks, and those we create along the way.
NSA's development programs help employees enhance their skills and improve their understanding of a specific discipline. The programs are generally three years long and feature rotational tours throughout the Agency. Designed for entry to mid-level employees, development program participants are afforded the opportunity to receive tailored training, often with a cohort, and multiple assignments across Agency Directorates to develop skills and experience to ground their career at the NSA.
Applicants may be considered for one of the following NSA's Development Programs:
CDP ' Computer Science Development Program
C2DP ' Cryptanalytic Computer Network Operations Development Program
CNODP - Computer Network Operations Development Program
CSEDP ' Cybersecurity Engineering Development Program
DDP ' Digital Network Exploitation Analyst Development Program
ITDP ' Information Technology Development Program
For additional information on these development programs please visit: www.intelligencecareers.gov/NSA/nsadevprograms.html.
As an NSA computer science development program participant your responsibilities may include:
- creating analytic applications that scale across multiple, very large, data sets from disparate sources
- leveraging and integrating open source, commercial off-the-shelf, and government developed software
- analyzing user/customer requirements related to software and/or software system design
- building software prototypes
- designing, developing, and debugging software applications
- troubleshooting and debugging computer code
- analyzing metadata
- applying mathematical or computational methods and lines of reasoning to complex software systems
- conducting target analysis and research
- identifying target communications within the global network
- performing global network analysis and mapping
- using knowledge of customer requirements to analyze and process intelligence information
- performing exploitation and operations on target networks
- designing and optimizing algorithms, data structures, modeling, and analytics to solve real-world scientific problems
- solving cryptanalytic, high-performance computing, and computer network problems
- leading new advances in computer science, such as:
- microprocessor-based advances
- beyond the horizon supercomputers
- signals processing (including analog control)
- user interfaces
- deep learning
- design and implementation of encryption
- advanced algorithms
- detecting, identifying, and evaluating vulnerabilities in cyberspace systems and/or networks
- developing software and/or hardware exploitation capabilities that enable collection of foreign intelligence from target networks and systems
- designing solutions to defend against adversarial threats directed towards the US, to include cutting-edge technologies such as mobile, SCADA, and Internet of Things
- analyzing sophisticated malware to thwart cyber attacks and identify new threats
- developing methods and applications for tools to exploit and analyze computer systems
The ideal candidate is someone who thrives on solving hard problems, has excellent communication and interpersonal skills, and is able to:
- work independently as well as in a team environment to build solutions
- handle multiple assignments
- synthesize information to solve complex problems
- apply knowledge of data structures and algorithms to software engineering problems
- develop, diagnose, and operate complex computer systems
- identify customer needs and validate product design
Additionally, the ideal candidate is someone with knowledge and experience in one or more of the following:
- programming and scripting experience (e.g., C, C++, Java, Assembly, Python, Perl, Ruby, Bash, Node.js, Spark, Puppet, SALT, KAFKA, HADOOP, VHDL, Verilog)
- building user facing services, middleware, and backend systems
- full-stack development
- computer networking (e.g., communication protocols, distributed systems, Internet of Things, real-time systems, routing and switching)
- protocol analysis (e.g. Wireshark, tcpdump)
- data spaces, data modeling, data analysis, storage design, and administration
- simulation/model development & prototyping
- information retrieval, machine learning, artificial intelligence, statistics and analytics
- hardware and software vulnerability analysis
- software reverse engineering/interactive debugging tools (e.g., IDA Pro, Ollydbg, gdb)
- hardware reverse engineering tools (e.g., JTAG, Oscilloscopes)
- software development life-cycle (design, develop, implementation, debug, testing)
- kernel and device driver development
- network/socket programming
- embedded systems development
- operating systems
- computational science
- algorithm analysis and design
- reverse engineering
- high performance computing
Pay, Benefits, & Work Schedule
On-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee.
Monday - Friday, with basic 8hr/day work requirements between 0600 and 1800 (flexible).
How To Apply - External
To apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. Please ensure your spam filters are configured to accept emails from (see application details).
Please continue to monitor the inbox of the email address submitted with your application. It is likely that the first communication you receive in response to submitting your application will be an automated email requesting your completion of an online interview through HireVue.
Please attach an unofficial copy of your transcripts when applying for this position. Providing a copy of your transcripts is especially critical since the minimum qualifications for this position require a Computer Science degree OR a related degree that demonstrates a concentration of CS coursework. For example, degrees in Engineering, Mathematics, Information Systems, Information Technology, Information Security, Information Assurance, Computer Security, and Digital Forensics MAY be considered for this position IF your coursework/transcripts demonstrate a concentration of CS coursework. Foundational CS coursework includes the following courses: Computer Architecture, Programming Languages, Data Structures, and Algorithms.
***PLEASE NOTE: U.S. Citizenship is required for all applicants. Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.
This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 USC, in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.
Please note that you may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the screening process of your application and will assist in determining your eligibility for the position. Be sure to elaborate on experiences in your resume. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet the qualifications for the position will be contacted to begin employment processing.
Please Note: Job Posting could close earlier than the closing date due to sufficient number of applicants or position no longer available. We encourage you to apply as soon as possible.
The National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.