Are you a computer science or computer/electrical engineering professional? Do you have strong software or hardware design, development, testing or reverse engineering skills? Do you want to be part of a team that develops ground breaking solutions? If so, click here to learn more and apply.\n\nWhen submitting your application, please ensure that you fully populate all sections of the resume tool with all relevant skills, experience, and education, as the resume entered into the tool will be the primary resume used to evaluate your application. Please do NOT populate the resume tool with 'see resume.'\n\nPlease attach an unofficial copy of your transcripts from all schools attended when applying for this position. Providing a copy of your transcripts is especially critical since the minimum qualifications for this position require a degree that demonstrates a concentration of Computer Science (CS) courses in foundational CS areas. The qualifications listed are the minimum acceptable to be considered for the position.\n\nDegree must be in Computer Science (CS), Mathematics, Engineering, or a related field. Degrees in Information Technology, Information Systems, Information Security, Networking (Systems Administration), Information Assurance, or Cybersecurity may be considered relevant if the programs contain, at minimum, a concentration of courses in the following foundational CS areas: algorithms; computer architecture (not network architecture); programming methodologies and languages; data structures; logic and computation; and upper-level mathematics (for example, calculus, discrete mathematics).\n\nRelevant experience must be in one or more of the following: engineering hardware or software over their lifecycle (i.e., requirements analysis, design, development, implementation, testing, integration, deployment/installation, and maintenance), programming, vulnerability analysis, penetration testing, computer forensics, or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will count as 6 months of experience).\n\nFULL PERFORMANCE\nEntry is with a Bachelor's degree plus 3 years of relevant experience or a Master's degree plus 1 year of relevant experience or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position. Are you driven by a passion to work at the cutting edge of technology? Do you dream to make the impossible possible? The National Security Agency is seeking highly motivated Computer Science and Computer/Electrical Engineering professionals to drive its mission to develop new capabilities, design new approaches, help solve complex problems, and research new solutions to propel our mission.\n\nAs a Capabilities Development Specialist (CDS), your job will be to develop custom high-priority offensive and defensive capabilities targeting the hardest-to-reach adversarial networks in the world. In defense of our Nation, we conduct innovative research and produce hardware and software tools unlike anything in the world. By joining our team, you will apply and grow your expertise to create new ways to get critical information to our national decision makers. Whether it is in software, hardware, or cutting-edge research, if you are up for a challenge, have unbridled curiosity, and a drive to develop tomorrow's technologies and tools today, apply to join our team. Use your unique experiences and expertise to protect national security interests as part of the world's most advanced team of computer science and engineering professionals!\n\n\nIf you have interests, skills, or experience in one or more of the following areas, we'd like to hear from you:\n\n- Software Specialties: Strong software development skills (C, C++, Assembly, ARM); Software RE/interactive debugging tools (e.g., Ghidra, OllyDbg, gdb); Software application vulnerability analysis and exploitation; Operating system internals; Mobile platform development and analysis; algorithmic analysis; prototyping.\n\n- Malware Reverse Engineer: Perform advanced malware analysis/reverse engineering of specialized malware/complex files. CISSP, CEH, GREM, GPEN certifications are a plus.\n\n- Hardware Specialties: - Hardware RE, design, development, or testing (Verilog, VHDL, FPGA, PCB); Testing and debugging tools (JTAG, Oscilloscopes, etc.);\n\nJob roles may include:\n\n- Developing exploitation capabilities and analytics to enable foreign target network collection \n- Designing hardware components and systems to further signals intelligence missions\n- Analyzing sophisticated malware\n\n\nWhen submitting your application, please ensure that you fully populate all sections of the resume tool with all relevant skills, experience, and education, as the resume entered into the tool will be the primary resume used to evaluate your application. Please do NOT populate the resume tool with 'see resume.'\n\nPlease attach an unofficial copy of your transcripts from all schools attended when applying for this position. Providing a copy of your transcripts is especially critical since the minimum qualifications for this position require a degree that demonstrates a concentration of Computer Science (CS) courses in foundational CS areas. We're looking for someone with knowledge, skills, and experience in one or more of the following:\n\n- Programming in languages such as C, C++, and Java, especially in kernel development and device driver development, network/socket programming, and embedded systems development\n- Advanced malware analysis/reverse engineering skills for specialized malware/complex files. CISSP, CEH, GREM, GPEN certifications are a plus\n- Assembly language(s)\n- Hardware design (e.g., FPGA, VHDL, Verilog, PCB)\n- Hardware Reverse Engineering\n- RF system design (e.g., DSP, SDR)\n- Embedded systems development\n- Software reverse engineering/interactive debugging tools (e.g., Ghidra, OllyDbg, gdb)\n- Hardware analysis tools (e.g., JTAG, Oscilloscopes)\n- Software vulnerability analysis and exploitation