Cyber

National security depends on technology as never before, and this dependence is growing at an ever increasing rate. As a cyber professional in the Intelligence Community, you will work as part of a team on the frontlines of defense against our cyber adversaries. The Intelligence Community needs cyber professionals with technical expertise and a driving desire to remain at the forefront of their field. Help protect national security interests as part of the world's most advanced team of cyber professionals.

Education/Experience

  • Computer Engineering
  • Computer Networking and Security
  • Computer Networking or Information Assurance
  • Computer Science or Computer Engineering
  • Computer Science or Computer Programming
  • Electrical Engineering
  • Information Assurance Certification
  • Information Technology or Information Systems

Example Positions

  • Chief, Office For Cyber Threat Analysis
    Develops and maintains all target systems involving collateral physical vulnerability research and bomb damage assessments.
  • Information Assurance (IA) Engineer
    Captures information security requirements and ensures that the requirements are integrated into IT component products and systems. Develops system concepts, contributes to the capability phase of the systems development life cycle, etc.
  • Information Systems Security Specialist
    Ensures that information systems security policies are implemented and maintained. Performs investigative triage and forensics; conducts investigations of unauthorized devices, equipment and security incidents; provides investigative support to federal law enforcement entities.
  • Technical Counterintelligence Officer
    Plans, organizes, and directs Technical Surveillance Countermeasure operations. Uses best practices to detect and/or prevent technical penetration of specified areas. Mitigates foreign intelligence and terrorist threats affecting personnel, technologies, infrastructure, and capabilities.
  • Computer Network Defense Analyst
    Uses information collected from a variety of computer network defense resources (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within the technical environment.
  • Computer Network Operator
    Provides time-sensitive mission support by maintaining situational awareness of potential cyber threats. Leverages technical methods to manage, monitor, and execute large-scale operations in response to national security requirements.
  • Capabilities Development Specialist
    Conducts comprehensive technology research to evaluate potential vulnerabilities in cyberspace systems. Detects, identifies, and describes specific vulnerabilities in a system, network, component, or process. Conducts software and systems engineering and software systems development in order to meet required capabilities.
  • All Source Analyst
    Plans, directs, or evaluates research of a major geographical area or a functional program with worldwide implications. Areas of expertise can include counterintelligence, counterproliferation, counterterrorism, cultural expertise, cyber, languages, scientific, and technical intelligence.

 

Learn more about careers within the IC at intelligencecareers.gov