Research Manager for Accenture Technology Labs, Cyber Security

Accenture Tech Labs Mission is “Bold Ideas With Game Changing Results”

Location – Washington, DC

Requisition number: 00092201

View Job Description:

Email resumes to:

R&D at the Labs: Working on technology’s frontier, Accenture Technology Labs finds bold new ways to achieve high-performance for Accenture and its clients. Our differentiator? We apply new technologies to solve real-world challenges. “We combine the creativity and deep expertise of our PhDs in the Labs with the real-world knowledge and business acumen of our global network of technologists who work with clients every day,” explains Don Rippert, chief technology officer. “As a result, we are uniquely able to help CIOs and business executives envision the future and to prioritize their investments in-and use of-technology innovation to achieve high performance.

Accenture seeks to hire a senior researcher to lead projects in the areas of intrusion-tolerant computing and self- healing infrastructure.  The research lead will define, manage and collaborate on new research problems and able to effectively collaborate with the science and technology community. Successful candidates will demonstrate a proven ability of presenting within workshops and interfacing with senior civilian and military leaders.

Primary Responsibilities:

  • Responsible for conducting scientific research related to tamper-resistance, metaphors of complex systems, fault-tolerance and methods and techniques to secure foundational Internet infrastructure
  • Responsible for helping with the commercialization of research outcomes either by turning work into project proposals or software/hardware products or services
  • Responsible for developing security architectures and models for virtualized environments and putting together working prototypes
  • Responsible for writing research papers and proposals and maintaining credentials through publications, presentations, external collaboration with the research community
  • Pursue and capture funding from DARPA, DoD, DHS, DoE and similar agencies

Basic Qualifications:

  • PhD in Computer Science, EE, Computer Engineering or direct related field
  • 2+ years experience practicing information assurance and computer network defense (CND)
  • 4 + years programming skills such as Java, C/C++ and scripting language (Perl/Python/Ruby)
  • 2 + years experience conducting research in one or more of these areas: secure virtualization, trusted path computing and network attack resiliency architectures
  • 1+ years experience working with hyper-visor technology, IPV6 and DNSSEC
  • 2+ years experience working with  NIST SP 800-30/37/39 and NIST 800-53
  • 3+ publications at refereed conferences and journals with presentation at security forums

Preferred Qualifications:

  • Excellent verbal, interpersonal and communication (presentation & writing) skills and able to conduct interactive dialogues on research topics with clients
  • Working experience with current techniques in memory data protection and infrastructure redundancy/fail-over/load-balancing
  • Demonstrated ability to apply mathematical techniques that support the derivation of integrity and integrity checks
  • Demonstrated experience with NSA’s High Assurance Platform, Trusted Platform Module specification or other techniques for hardware-assisted agreements and core trust arbiters
  • Background in cryptography and Public Key Infrastructures
  • Demonstrated experience with as NISTSP 800-30/37/39 and NIST SP 800-53
  • Hands on working experience with VMWare
  • Familiarity with federal funding procedures, regulations, policies and practices
  • Proven track record of program capture is preferred
  • A background in national security related issues is a plus

Applicants for employment in the U.S. must possess work authorization which does not require sponsorship by the employer for a visa.



Leave a Comment so far
Leave a comment

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: