MITRE’s Cyber Physical and Mobile Technology Security Department is seeking cyber security engineers with expertise and innovative ideas in mobile security with an interest in areas such as threat-informed defense, adversary emulation, application security, operating system security architecture, identity and access management, cyber resiliency, enterprise management, forensic analysis, and security operations.
Responsibilities may include:
- Researching, developing, operationalizing, evaluating, and improving defensive tactics, techniques, and procedures (TTPs) for detecting and responding to mobile security cyber threats,
- Applying MITRE ATT&CK®to evaluate the abilities of mobile security products and security architectures to defend enterprises from cyber threats,
- Performing security evaluations of Android and iOS mobile applications,
- Investigating and prototyping approaches for mobile application authentication and single-sign-on,
- Investigating and prototyping best practices for securing mobile devices in enterprise environments, including addressing Bring Your Own Device (BYOD) and Corporately Owned Personally Enabled (COPE) use cases, and securely connecting to cloud resources such as Microsoft 365.
Minimum Qualifications:
- BS degree and minimum of 5 to 10 years related experience.
- Applicants selected for this position will be subject to a government security investigation and must meet eligibility requirements for access to classified information or applicants who are eligible for security clearances.
Required Qualifications:
- Bachelor's degree in Cybersecurity, Electrical Engineering, Computer Science, Computer Engineering, or related field.
- At least 3 years of successful professional experience in cybersecurity or a related field (more is great too, we’re hiring at all levels).
- Possess working knowledge of core cybersecurity principals
- Experience in mobile technologies/ mobile security
- Ability to think critically, work in group settings and be proactive in pursuing research and problem-solving with minimal supervision.
- Ability to obtain and maintain a Secret level security clearance
Preferred Qualifications:
- Experience with mobile operating systems, embedded operating systems
- Experience with identify and access management solutions for mobile environments
- Experience with adversary emulation.
- Working knowledge of cybersecurity policies and standards related to mobile technologies
- Possess strong writing and communication skills.