NSA is in search of Computer Science professionals to solve complex problems, test innovative approaches and research new solutions to storing, manipulating, and presenting information. We are looking for you to apply your computer science expertise to projects that seek to create new standards for the transformation of information. If you want to develop technologies and tools and be a part of cutting edge innovations ' join our team of experts! Help protect national security interests as part of the world's most advanced team of computer science professionals!
The National Security Agency (NSA) is part of the DoD Intelligence Community Defense Civilian Intelligence Personnel System (DCIPS). All positions in the NSA are in the Excepted Services under 10 United States Codes (USC) 1601 appointment authority.
How To Apply - External
To apply for this position, please click the 'Apply' button located at the top right of this posting. After completing the application for the first time, or reviewing previously entered information, and clicking the 'Submit' button, you will receive a confirmation email. Please ensure your spam filters are configured to accept emails from
***PLEASE NOTE: U.S. Citizenship is required for all applicants. Additionally, the Federal Government requires all personnel to be fully vaccinated at the time of employment, subject to exceptions as required by law.
Reasonable accommodations provided to applicants with disabilities during the application and hiring process where appropriate. NSA is an equal opportunity employer and abides by applicable employment laws and regulations. All applicants and employees are subject to random drug testing in accordance with Executive Order 12564. Employment is contingent upon successful completion of a security background investigation and polygraph.
This position is a Defense Civilian Intelligence Personnel System (DCIPS) position in the Excepted Service under 10 U.S.C. 1601. DoD Components with DCIPS positions apply Veterans' Preference to eligible candidates as defined by Section 2108 of Title 5 in accordance with the procedures provided in DoD Instruction 1400.25, Volume 2005, DCIPS Employment and Placement. If you are a veteran claiming veterans' preference, as defined by Section 2108 of Title 5 U.S.C., you may be asked to submit documents verifying your eligibility.
Please note that you may be asked a series of questions depending on the position you apply for. Your responses will be used as part of the screening process of your application and will assist in determining your eligibility for the position. Be sure to elaborate on experiences in your resume. Failure to provide the required information or providing inaccurate information will result in your application not being considered for this position. Only those applicants who meet the qualifications for the position will be contacted to begin employment processing.
Please Note: Job Posting could close earlier than the closing date due to sufficient number of applicants or position no longer available. We encourage you to apply as soon as possible.
Pay, Benefits, & Work Schedule
On-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee.
Monday - Friday, with basic 8hr/day work requirements between 0600 and 1800 (flexible). Applicants should be aware that some of these jobs support 24/7 operations based on mission requirements and shift schedules may vary to include night shift.
The ideal candidate is someone with a desire for continual learning and strong problem-solving, analytic and interpersonal skills who is:
- able to communicate effectively
- able to collaborate with others
Specialized skills and experience in one or more of the following is desired:
- Knowledge of network protocols (especially TCP/IP, VOiP, wireless protocols)
- Understanding of Internet
- Understanding of WAN and LAN
- Vulnerability analysis
- Programming experience (prefer one or more of the following: C, C++, Java, Assembly, Python)
The professionals at the National Security Agency (NSA) have one common goal: to protect our nation. The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to classified national security information.
The need to maintain our core Computer Science group is vital to provide the technical capabilities necessary to successfully execute NSA's mission. The increased complexity of supporting NSA's mission requires world class researchers, programmers, and developers who operate in teams in areas such as software engineering, information technology infrastructure, high performance computing, data science, architectures, computer security, and networking in order to design and develop advanced tools, techniques, and systems.
Digital Network Exploitation Analysts employ computer science skills to perform discovery and target technology analysis of digital network and mobile communications.
NSA's development programs help employees enhance their skills and improve their understanding of a specific discipline. The programs are generally three years long and feature rotational tours throughout the Agency. Designed for entry to mid-level employees, development program participants are afforded the opportunity to receive tailored training, often with a cohort, and multiple assignments across Agency Directorates to develop skills and experience to ground their career at the NSA.
Applicants will be considered for one of the following NSA's Development Programs:
DDP - Digital Network Exploitation Analyst Development Program
IASDP - Intrusion Analyst Skill Development Program
For additional information on these development programs please visit: www.intelligencecareers.gov/NSA/nsadevprograms.html.
As a Digital Network Exploitation Analyst at the NSA, responsibilities may include:
- conducting analysis of metadata
- conducting target analysis and research
- identifying target communications within the global network
- performing global network analysis and mapping
- using knowledge of customer requirements to analyze and process intelligence information
- performing exploitation and operations on target networks