Career Outlook SPOTLIGHT ON SPY AGENCIES CONTINUES
information technology security plan known as Cyber Command. This new system was designed for managing cyber intelligence and defending the Department of De- fense network of over five million computers. Addition- ally, the NSA revealed a program entitled Perfect Citizen for defense against cyber threats targeting companies running grids for national electrical and telecom grids.
If you are interested in pursuing a career with the NSA and possess computer hard- ware and software experience, you might consider becoming a hardware/software design engineer. This position consists of customizing hardware and software solu- tions for NSA missions. Those experienced in coding, Linux software and program- ming languages like C and VHDL would be preferable, especially combined with a bachelor’s degree, or an associate’s degree and two years’ experience. Even those with a high school diploma and five years’ experience and additional certifications would be considered.
Another available position with NSA would be as a telecommunications engineer. In this field, those possessing a bachelor’s or master’s degree in telecommunications, information systems, engineering, or computer science, plus four years’ experience, are considered qualified applicants. The job consists of supporting the NSA net- works, servers, and routers, along with installing and testing new hardware compo- nents. As a telecommunications engineer, you would work with a team of computer scientists specializing in 24/7 support of the NSA communications systems.
Department of Homeland Security
The NSA has also joined forces with the Department of Homeland Security (DHS), creating specific teams from both agencies to merge intelligence and work together to protect the United States against cyber attacks.
Whereas the NSA is based in Fort George G. Meade, Maryland, and the CIA in Arlington, Virginia, the
Department of Homeland Security has positions offered nationwide. In late 2009, President Barack Obama signed the 2010 Homeland Security Act that included $397 million for cyber security. As part of this act, the National Cyber Security and Communications Integration Center (NCCIC) opened, with specific concentration on deciphering and responding to threats affecting information technology and cyber communications. At NCCIC, a team of DHS analysts work side-by-side with other spy agencies tracking and analyzing Internet cyber threats.
Employment opportunities with DHS range from directors in science and technol- ogy to the U.S. Secret Service and the Transportation Security Administration. The department has constant postings for information technology specialists for monitoring complex networks, examining security threats, and gathering intelli- gence. DHS is also in dire need of IT specialists who can analyze information security systems and protect the vast number of networks and data from cyber attacks.
Whether you are a scientist specializing in research and development, or an infor- mation technology specialist with an interest in conducting studies for identifying potential security risks in the transportation industry, you have plenty of career options.
52 HISPANIC ENGINEER & Information Technology | 2011
www.hispanicengineer.com
INTELLIGENCE AGENCIES IN THE FEDERAL GOVERNMENT
Many branches of the federal government— such as the Department of Energy, Department of Defense, Department of Justice, Department of State, and Department of the Treasury—rely on internal intelligence- gathering agencies to keep our global security and economy running effectively.
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64