Which devices should you take or prioritize when conducting a raid in a special operations mission? Can a vehicle navigation system be more valuable than a cellphone in a terrorism investigation? How do you maintain the velocity of an investigation or incident response when there are hundreds of terabytes of data to analyze from myriad devices and platforms? What is the next generation of technologies Federal Law Enforcement, the Department of Defense (DoD) and the US Intelligence Community (USIC) should be concerned about? How can you quantify the operational risk — and value — that arises through the use of consumer electronics, social media, and commercial communication networks?
Who we are:
The CERT Digital Intelligence team seeks to develop cutting edge solutions to address critical and emerging challenges encountered by the DoD, Federal Law Enforcement, and US Intelligence Community. Key to our success is a diverse team of researchers, scientists, and engineers with a passion for understanding the implications of emerging technologies on US Government defensive and offensive missions.
Who we are looking for:
You should be a strong technical leader with a solid background in digital exploitation and capable of identifying gaps between theory and practice. You will be responsible for the development and execution of a strategic vision and roadmap that advances the state of the art and practice for both defensive and offensive cyber operations. Your role will provide leadership to a diverse team working across the following areas:
- Platform assessment
- Hardware and systems analysis to assess the appropriateness of technological solutions based on their intended use or application.
- Analysis of non-traditional systems with potential forensic/operational value.
- Mobile devices and applications
- Development of tools and methods to enable rapid analysis of mobile devices and applications for the purposes of understanding their value in digital operations as well as the potential privacy implications inherent to their use.
- Identity Intelligence and Resolution
- Development of science-based approaches for identifying and correlating users from unrelated or non-obvious digital artifacts.
- Red Teaming
- Engineering and design of focused threat-based analyses to determine the efficacy of technical solutions and approaches to US Government challenges.
- Non-traditional forensics
- Research and development of tools and methods for forensic analysis of non-traditional devices with potential forensic or operational value. These may include, but are not limited to, embedded systems, wearables, IoT devices, gaming consoles, vehicle-based systems, etc.
- Radio/Spectral Research and Analysis
- Analysis of emerging consumer technologies related to low-powered radios, cellular, and other means of communication.
Team deliverables include technical publications; industry and government conference presentations; course development and delivery; direct customer engagement; and prototype tools and techniques.
- Master’s degree, preferably in Electrical/Computer Engineering, Computer Science, Machine Learning, Mathematics, or equivalent field with 5+ years of post-degree experience.
- Technical publication and presentation experience. Demonstrated technical proficiency with contemporary computing hardware, software and network technologies.
- Willingness to travel to various locations to support the SEI’s overall mission. This includes within the SEI and CMU community, sponsor sites, conferences, and offsite meetings on occasion. Moderate Travel (20%)
- You will be subject to a background check and will need to obtain and maintain a Department of Defense security clearance.
Candidates with the following experience are preferred:
- Exploratory data analysis
- Software/Hardware debugging and prototyping
- Reverse-engineering and vulnerability discovery
- Technical management of staff, projects, and customer deliverables
- Customer and community engagement
Job Function Breakdown:
30% Manages group to effectively implement the SEI and task order work plans. Sets goals and objectives and manages operational and functional business activities. Develops, implements and tracks short and long term operational plans (financial, staffing, infrastructure, project).
30% Provides guidance to and monitors the success of team and project leads in meeting strategic and operational goals. Assesses performance of direct reports and makes salary recommendations for all staff within areas of responsibility. Provides oversight of team leads and their supervisory responsibilities of technical staff and conducting performance reviews. Responsible for recruitment, hiring, development and retention of all technical and support staff.
20% Sets technical agenda of the technical area. Leads planning process and contribute to the development the CERT strategic plan. Matures the state of the art/state of practice for areas of responsibility. Ensures regular update of technical area’s plan; reviews feasibility of plan, identifies risks and defines risk mitigation strategy. Articulates vision for internal and external audiences. Engages with current and future customers to pursue growth and evolution of work.
10% Identifies opportunities for new technical projects and manages start-up of new, high-priority technical programs of work. Works with leadership to develop and implement a funding and transition plan for new work areas.
10% Directs organizational effectiveness and staff learning and development plans. Identifies operational success measures and process improvements. Leads corrective action.
100% Total Effort
Please visit “Why Carnegie Mellon” to learn more about becoming part of an institution inspiring innovations that change the world.
A listing of employee benefits is available at: www.cmu.edu/jobs/benefits-at-a-glance/.
Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.