conduct technology research and assessments to evaluate potential vulnerabilities in cyberspace systems. The candidate shall perform work involving detection, identification, and description of specific vulnerabilities in a system, network, component or process and, when directed, provide and support prototype development, integration capability and/or evaluate prototype utility. Findings and analysis shall be presented via PowerPoint presentations, Word documents, and oral presentations as Technical…
Words 349 - Pages 2