Manager of Research, Accenture Technology Labs Cyber Security (Enhanced Situational Awareness)

Requisition Number: 00092202

View Job Description:

Email Resume to:

Location – Washington, DC

R&D at the Labs: Working on technology’s frontier, Accenture Technology Labs finds bold new ways to achieve high-performance for Accenture and its clients. Our differentiator? We apply new technologies to solve real-world challenges. “We combine the creativity and deep expertise of our PhDs in the Labs with the real-world knowledge and business acumen of our global network of technologists who work with clients every day,” explains Don Rippert, chief technology officer. “As a result, we are uniquely able to help CIOs and business executives envision the future and to prioritize their investments in-and use of-technology innovation to achieve high performance.

Accenture seeks to hire a senior researcher to lead projects in the areas of intrusion prevention and detection, attribution and anticipation of cyber threats and collaborative situational awareness. The research lead will define, manage and collaborate on new research problems and able to effectively collaborate with the science and technology community. Successful candidates will demonstrate a proven ability of presenting within workshops and interfacing with senior civilian and military leaders.

Primary Responsibilities:

Responsible for conducting scientific research related to intrusion detection & prevention, cyber identity & attribution, data visualization and human threat factors

  • Responsible for the commercialization of research outcomes either by turning work into project proposals or software/hardware products or services
  • Responsible for putting in place the techniques, tactics and procedures to better understand malware behavior and mitigating advanced persistent threats
  • Responsible for writing research papers and proposals and maintaining credentials through publications, presentations, external collaboration with the research community
  • Pursue and capture funding from DARPA, DoD, DHS, DoE and similar agencies

Basic Qualifications:

  • PhD in Computer Science, EE, Computer Engineering or direct related field
  • 4+ years experience practicing information assurance and computer network defense (CND)
  • 3 + years in program management
  • 3 + years experience conducting research in areas such as:  intrusion detection, situational awareness, vulnerability analysis, data visualization, cyber identity and attribution

Preferred Skills:

Excellent verbal, interpersonal and communication (presentation & writing) skills and able to conduct interactive dialogues on research topics with clients

  • 5+ publications at refereed conferences and journals with presentation at security forums
  • 2+ years experience working with NIST SP 800-30/37/39 and NIST 800-53
  • 4 + years programming skills such as Java, C/C++ and scripting language (Perl/Python/Ruby)
  • Working experience with reverse malware engineering and knowledge of new attribution approaches such as DARA’s Cyber Genome Program
  • Demonstrated ability to apply data mining techniques to a broad range of network, web and structured and unstructured data.
  • Substantial experience with IDS/IPS, SIEM rule sets, network engineering technologies and topology
  • Knowledge of federal funding procedures, regulations, policies and practice
  • Proven track record of program capture is preferred
  • Advanced understanding of hacker methodologies and tactics
  • Demonstrated experience interfacing with senior civilian and government leaders and a deep expertise in system building, technology transfer, project management
  • Strong and proven background in national security related issues
  • Top Secret/SCI security clearance

Applicants for employment in the U.S. must possess work authorization which does not require sponsorship by the employer for a visa.



1 Comment so far
Leave a comment

hi ..I am Maddy..An Engineering Student …doing A project on Network Based Intrusion Detection System.
In This project I gonna detect old And totally new intrusion signatures by some algorithms..And it is based on one of the IEEE paper.
If you are interested in project .reply me back..
on my email address

Comment by MADDY

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: