Skip to main content
U.S. flag
Back to results

Technology Vulnerability Analyst - Mid to Experienced Level (Maryland)

Department of Defense
National Security Agency/Central Security Service

Summary

Our mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to sensitive or classified national security information. Technology Vulnerability Analysts detect and mitigate close access technical attacks unintentional (TEMPEST) threats emanating from secure facilities and equipment.

Overview

Help
Accepting applications
Open & closing dates
02/27/2026 to 03/07/2026
Salary
$105,262 to - $192,764 per year
Pay scale & grade
GG 11 - 14
Location
few vacancies in the following location:
Fort Meade, MD
Remote job
No
Telework eligible
No
Travel Required
Not required
Relocation expenses reimbursed
Yes—You may qualify for reimbursement of relocation expenses in accordance with agency policy.
Appointment type
Permanent
Work schedule
Full-time
Service
Excepted
Promotion potential
None
Job family (Series)
Supervisory status
No
Security clearance
Top Secret
Drug test
Yes
Position sensitivity and risk
Special-Sensitive (SS)/High Risk
Trust determination process
Financial disclosure
No
Bargaining unit status
No
Announcement number
1254422
Control number
859363600

Videos

Duties

Help

Are you an emerging or seasoned network professional who wants to work our nation's tough cybersecurity problems? Do you enjoy deeply technical, hands-on work? Do you want to identify vulnerabilities in network infrastructure devices and then figure out how to deal with them? Are you looking to make an impact in cybersecurity and advance your career while enjoying the outstanding benefits of federal service?

Technology Vulnerability Analyst at NSA have the opportunity to work in the following areas:
- Wired and wireless network security
- Vulnerability discovery and analysis
- Scalable mitigations development
- Perimeter/boundary defense
- Collaboration platforms, such as VoIP and VTC systems
- Mobile network security
- Tailored security solutions
- Reverse engineering
- Control system security
Malware analysis
- Researching emerging network industry technologies and solutions
- Ensuring adequacy of cybersecurity standards and configurations
- Fusing vulnerability assessments from all sources into a unified picture of network risk

As a TEMPEST Technology Vulnerability Analyst, responsibilities include:
- Performing TEMPEST field testing to discover vulnerabilities in systems and facilities
- Providing Subject Matter Expert (SME) support to the DoD and Government agencies to ensure that TEMPEST, TSCM requirements are applied equally throughout the Intelligence Community (IC)
- Performing TEMPEST laboratory / facilities testing to ensure that TEMPEST certification meets the current National TEMPEST requirements
- Performing TEMPEST testing of Commercial Off The Shelf (COTS) equipment to discover the extent of vulnerabilities for countermeasure purposes
- Modernize TEMPEST related IA standards, policies and procedures
- Performing technical and operational functions in radio frequency (RF) survey, physical (structural, network) evaluations
- Performing audits, inspections and investigations in accordance with government regulations and make appropriate recommendations for improvement
- Performing research and development on future TEMPEST/TSCM countermeasures

Requirements

Help

Conditions of employment

  • Employment is contingent upon successful completion of a security background investigation and polygraph.

Qualifications

The qualifications listed are the minimum acceptable to be considered for the position.

Degree must be in Computer Science or a related field (e.g., Engineering, Physics, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, and Information Security).

Relevant experience must be in vulnerability analysis and/or computer forensics. In addition, experience may include the following: computer or information systems design/development, coding, information/cyber/network security, information assurance, systems engineering, and/or network and/or system administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).

FULL PERFORMANCE
Entry is with a Bachelor's degree plus 3 years of relevant experience, or a Master's degree plus 1 year of relevant experience, or a Doctoral degree and no experience. An Associate's degree plus 5 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.

SENIOR
Entry is with a Bachelor's degree plus 6 years of relevant experience, or a Master's degree plus 4 years of relevant experience, or a Doctoral degree plus 2 years of relevant experience. An Associate's degree plus 8 years of relevant experience may be considered for individuals with in-depth experience that is clearly related to the position.

Additional information

Pay: Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.

Salary Range: $105,262 - $192,764 (Full Performance, Senior)
Salary range varies by location, work level, and relevant experience to the position.

Training will be provided based on the selectee's needs and experience.

Benefits: NSA offers a comprehensive benefits package.

Work Schedule: This is a full-time position, Monday - Friday, with basic 8hr/day work requirement between 6:00 a.m. and 6:00 p.m. (flexible).

DCIPS Trial Period:
If selected for this position, you will be required to serve a two-year DCIPS trial period, unless you are a veterans' preference-eligible employee, in which case you are required to serve a one-year trial period. This trial period runs concurrently with your commitment to the position, if applicable. Before finalizing your appointment at the conclusion of your trial period, NSA will determine whether your continued employment advances the public interest. This decision will be based on factors such as your performance and conduct; the Agency's needs and interests; whether your continued employment would advance the Agency's organizational goals; and whether your continued employment would advance the efficiency of the Federal service.
Upon completion of your trial period, your employment will be terminated unless you receive certification, in writing, that your continued employment advances the public interest.
If you do not receive certification for continued employment, you should receive written notice prior to the end of your trial period that your employment will be terminated and the effective date of such termination.

Candidates should be committed to improving the efficiency of the Federal government, passionate about the ideals of our American republic, and committed to upholding the rule of law and the United States Constitution.

How you will be evaluated

You will be evaluated for this job based on how well you meet the qualifications above.

The ideal TEMPEST candidate is someone with the TEMPEST certification or TEMPEST knowledge with a desire for continual learning, strong communication (oral and written), problem-solving, analytic, and interpersonal skills who is:
- accountable
- detail-oriented
- adaptable
- customer and results-oriented and able to manage multiple tasks with competing timelines and deliverables
- able to work effectively (independently and/or within teams) across functional areas in a collaborative environment

TEMPEST candidates' desired experience includes Radio Frequency (RF), Physics, Signals Analysis, Wireless, Testing Equipment (Oscilloscopes, Signal Generators, Signal Analyzers), Packet Analysis, Vulnerability Analysis, Cyber Security, and Crypto Devices.

Your session is about to expire!

Your USAJOBS session will expire due to inactivity in 8 minutes. Any unsaved data will be lost if you allow the session to expire. Click the button below to continue your session.