About the job
What Impact You'll Have
- At GRVTY, we are on the lookout for a seasoned Cryptologic Computer Scientist who will innovate, design, and implement effective solutions for complex cryptologic computer science challenges. Within a scientific framework, you will develop solutions that stem from forensic analysis and attack attribution, safeguard critical networks and operational systems, and drive knowledge discovery in both passive and active systems to support various cryptologic missions.
What You'll be Owning
- The ideal candidate will leverage their computer science expertise across various domains, including operating systems, compiler theory, database theory, algorithm analysis, computer architecture, discrete mathematics, programming language theory, and data structures to tackle each challenge with cutting-edge techniques, tools, and methodologies. This role is a blend of computer science and cyber threat analysis, requiring proficiency in Python, Spark/PySpark, and a robust background in network and protocol analysis, complemented by familiarity with customer tools.
What You Must Have
- A Master’s degree accompanied by 6 years of pertinent experience.
- A Bachelor’s degree with 8 years of relevant experience.
- An Associate’s degree with 10 years of relevant experience.
- Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field, with at least one programming course and a minimum of 4 upper-level mathematics classes (Calculus and above).
- Proven experience in theoretical or applied computer science, simulation/model development, design and evaluation of mathematical models and techniques, algorithm development, reverse engineering, or the design and development of computer systems, including both hardware and software.
- Advanced skills in Python and Spark/PySpark.
- Strong background in Network and Protocol Analysis.
- Familiarity with customer-specific tools.
- Current TS SCI clearance with polygraph.
What Would be Nice to Have
- Experience in designing, developing, delivering, and operating solutions for complex cryptologic computer science challenges within a scientific framework.

