Data Scientist - Technical Education, Training & Library - Chandler, AZ at Geebo

Data Scientist - Technical

The Department of Homeland Security (DHS) Office of the Chief Information Officer (OCIO) Office of the Chief Data Officer (CDO) Directorate is recruiting for highly skilled and experienced Data Scientists in the Technical Career Track to collaborate with senior leadership and engage in various projects informing data-driven and artificial intelligence (AI) related decisions enhancing the security and resilience of our nation.
These positions are in the DHS Cybersecurity Service.
As a Data Scientist at the US Department of Homeland Security (DHS), Office of the Chief Information Officer (OCIO) within the Office of the Chief Data Officer Directorate, you will play a pivotal role in utilizing your advanced technical expertise to address intricate data-related issues.
This will involve crafting inventive solutions with a significant national reach, encompassing the creation and application of bespoke algorithms, methodologies, and strategies for data collection, management, and analysis.
Your contributions will be vital in developing highly efficient solutions that bolster essential DHS initiatives.
Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track will generally apply their expertise to perform a range of tasks, including:
Applying technical expertise and knowledge to develop data management standards, policies, and procedures and facilitate and implement effective data mining and warehousing programs for collecting, cleaning, converting and standardizing complex data for analysis.
Providing specialized technical leadership to conduct hypothesis testing using statistical processes, and applying quantitative techniques (e.
g.
, descriptive and inferential statistics, sampling, experimental design) to assess the validity of source data and develop strategic insights from large data sets.
Proactively collaborating with systems analysts, engineers, and programmers to design sophisticated applications for integrating data from several disparate sources and using different technologies to provide a unified data view.
Applying expertise to use a variety of tools, including Google Analytics, to monitor web data, log data, and threat data analytics, to provide a managed flow of relevant information based on cybersecurity mission requirements.
Implementing or providing expert input into analyzing and defining data requirements and specifications for using various tools and methodologies (e.
g.
, Statistical Package for Social Sciences SPSS , Statistical Analysis System SAS , R Analytics, Statistics and Data STATA ) to discover new patterns and behaviors and provide DHS Headquarters (HQ) and/or Component stakeholders actionable recommendations.
Planning for anticipated changes in enterprise data capacity requirements and effectively allocating storage capacity in the design of new data management systems, technologies, and architectures.
Providing technical and nontechnical support for collecting metrics and trending data using enterprise data management systems (e.
g.
, SPLUNK) and cloud-based systems (e.
g.
, AWS).
Using data visualization tools (e.
g.
, R, Tableau, Flare, Google Visualization Application Programming Interface API , RGIS) to design charts and exhibit graphic representations for the purposes of providing actionable recommendations to critical leadership officials and stakeholders.
Using various tools (e.
g.
, SPSS, SAS, R, STATA) and methodologies for analyzing and interpreting complex data to discover new patterns and behaviors and provide usable information to decision makers and other users.
Monitoring national and international events as well as advances in the field of data science, mathematics, and statistics to keep expertise fresh.
These positions are in the Technical Track at the Principal and Senior Principal Cybersecurity Specialist career levels.
At these levels, individuals generally:
Have between 12-15 years of cybersecurity work experience.
Range from experienced professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.
DHS Cybersecurity Service employees with a technical capability in Data Science will generally:
Examine data with the goal of providing new insight for the purposes of cybersecurity.
Design and implement custom algorithms, flow processes and layouts for complex, enterprise-scale data sets used for modeling, data analytics, and research purposes.
Apply understanding of cybersecurity field to inform analytical methodologies and algorithms selected for implementation.
Design, build, implement, integrate, and maintain systems and tools for data trend and pattern analysis of cyber data.
Apply knowledge of statistics and mathematical theory to develop and integrate new and emerging technologies, such as machine learning and deep learning concepts and techniques.
Communicate insights gained to mission user.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise.
In recruiting for these opportunities, DHS may hire employees at higher or lower career levels and associated salaries.
These positions are focused on Data Science.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities.
To learn more about technical capabilities, visit ourapplication portal.
Recommended Skills Api Algorithms Amazon Web Services Big Data Cloud Computing Data Analysis Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3r21m6f1x60n738bt7', 'ExternalApply-j3r21m6f1x60n738bt7'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.