Fort Meade, MD14 days ago
The right candidate will apply requisite computer science skills (operating systems, compiler theory, databased theory, algorithm analysis, computer architecture, discrete math, programming language theory, and data structure) to each problem to provide state-of -the-art techniques, tools, and approaches. . This opportunity supports a team of Data Scientists, Cryptologic Computer Scientists, Cryptanalytic Computer Scientists, Cryptologic Cyber Planners, Intrusion Analysts, Protocol Analysts, Signals Analysts and Reverse Engineers, responsible for improving, protecting, and defending our Nation's Security.