Worldwide job

Apply Now – Full-Time Computer Scientist Career in NYC 2026:

Job schedule:

📅 Date: February 24, 2026
📍 Location: Oak Ridge, TN, USA 37830
🏢 Company: Oak Ridge National Laboratory
🆔 Requisition ID: 16022

Introduction:

Cyber security isn’t just about protecting computers anymore. It’s about protecting nations. Think of it as guarding the digital gates of critical infrastructure, defense systems, and energy networks. That’s exactly what this role focuses on.

This position supports national security agendas by identifying and mitigating software vulnerabilities within defense, energy, and other critical infrastructure assets. If you’ve ever wondered what it feels like to work on the front lines of digital defense, this is it.


Why Cyber Security Matters in National Security

Imagine a power grid going offline due to a software flaw. Or a defense system compromised because of a vulnerability hidden deep in code. These aren’t movie plots — they’re real risks.

Cyber security research helps prevent such scenarios by proactively finding and fixing weaknesses before they can be exploited.


Overview of the Opportunity

This role combines research, technical expertise, communication, and strategic thinking. You won’t just be writing code — you’ll be shaping the security landscape of critical systems.


Major Duties and Responsibilities

Supporting National Security Objectives

You will directly support national security initiatives related to identifying and mitigating vulnerabilities in software systems used across defense, energy, and infrastructure sectors.

This isn’t routine IT work — it’s mission-driven security research.


Identifying and Mitigating Software Vulnerabilities

Your job includes discovering weaknesses in critical systems and developing strategies to reduce or eliminate them. Think of it as digital detective work — but with real-world impact.


Research and Development of Security Tools

You’ll research, develop, and improve tools and techniques designed to detect vulnerabilities. This means continuous innovation — building better tools to fight smarter threats.


Staying Updated on Cyber Security Trends

Cyber threats evolve daily. Maintaining awareness of current research, emerging threats, and major cyber events is essential. You’ll stay informed and ready.


Report Writing and Sponsor Contributions

Research doesn’t end at discovery. You’ll contribute material to reports prepared for project sponsors, translating complex findings into clear documentation.


Assisting with Research Proposals

You’ll assist in developing research proposals focused on vulnerability science. This includes contributing ideas and helping shape future projects.


Promoting Cyber Security Capabilities

Part of the role involves promoting cyber security research and development capabilities to the national security community. Communication matters just as much as technical skills.


Presenting to Leadership and Technical Audiences

You’ll present findings and provide guidance on cyber security issues, research programs, and technical developments to leadership, sponsors, and expert audiences.


Communicating Organizational Capabilities

You’ll identify and articulate internal capabilities and customer requirements to both internal and external stakeholders. Clear communication bridges technical work and strategic goals.


Basic Qualifications

Required Educational Background

A bachelor’s degree in computer science, computer engineering, or a related field is required. A strong academic foundation sets the stage for success in this role.


Foundational Cyber Security Knowledge

You must demonstrate a fundamental understanding of cyber security principles, tools, and operational applications.

This means knowing how threats work — and how to stop them.


Preferred Qualifications

Programming Experience

Current experience writing software is highly preferred.

Key Languages: C, C++, Python, Java

Proficiency in C, C++, Python, and Java is particularly relevant. These languages are frequently used in systems programming, vulnerability research, and tool development.


Understanding Binary Architecture

Basic binary literacy is important. You should understand software architecture, language characteristics, binary formats, and operating systems.

This knowledge allows you to look beneath the surface of applications.


Static and Dynamic Analysis Skills

Familiarity with static and dynamic binary analysis techniques, including fuzzing, is valuable.

Tools like Ghidra and IDA Pro

Experience with reverse engineering tools such as Ghidra or IDA Pro is a plus. These tools help dissect compiled code and uncover hidden vulnerabilities.


Source Code Auditing and Disassembly

Experience auditing source code and working with disassembled binaries is advantageous. It demonstrates deep technical capability.


Embedded Systems Knowledge

Familiarity with embedded systems is preferred, especially since critical infrastructure often relies on embedded technology.


Web and Network Tools Experience

Prior experience with tools like Burp Suite and Wireshark is beneficial. These tools assist in analyzing web applications and network traffic.


Soft Skills and Personal Attributes

A demonstrated desire to acquire new knowledge and learn new skills is essential.

Strong interpersonal, verbal, and written communication skills are also required.

You must be proactive, capable of developing plans to address complex problems, and able to work independently while contributing to a larger team.


Participation in Cyber Competitions

Participation in capture-the-flag events or cyber challenge competitions is considered a plus. It reflects hands-on experience and passion for cyber security.


Work Environment and Expectations

Fast-Paced Research Setting

You will function in a fast-paced research environment where priorities can shift quickly.


Problem-Solving and Independent Work

The ability to set priorities, manage multiple tasks within deadlines, and adapt to changing needs is crucial.


Team Collaboration

While independence is important, collaboration within a research team is equally vital.


Special Requirements

Letters of Reference

Applicants must submit two letters of reference. These can be uploaded directly with the application or sent via email with the position title and number included in the subject line.


Security Clearance Requirements

This position requires the ability to obtain and maintain an HSPD-12 PIV badge.

It also requires obtaining and maintaining a Sensitive Compartmented Information (SCI) clearance from the Department of Energy.


Substance Abuse Testing and Polygraph

This role is designated under a Workplace Substance Abuse Program. It requires passing a pre-placement drug test and participating in random drug testing.

Due to the SCI clearance requirement, random polygraph testing may also be required.


Visa Sponsorship Policy

Visa sponsorship is not available for this position.


About ORNL

Legacy and Mission

As a U.S. Department of Energy Office of Science national laboratory, ORNL carries over 80 years of legacy addressing national challenges.

With more than 7,000 employees, the organization drives scientific breakthroughs and translates them into real-world solutions in energy, environmental, and security domains.


Commitment to Diversity and Inclusion

ORNL aims to foster an environment where diverse perspectives and backgrounds are valued. Inclusion is a cornerstone of its mission and culture.


Compensation and Benefits

Competitive Salary Structure

ORNL offers competitive pay designed to attract and retain high-performing professionals.


Medical and Retirement Plans

Employees benefit from medical coverage, retirement plans including a 401(k), and contributory pension plans.


Additional Employee Benefits

Other benefits include:

  • Prescription Drug Plan
  • Dental and Vision Plans
  • Life Insurance
  • Disability Benefits
  • Generous Vacation and Holidays
  • Parental Leave
  • Legal Insurance with Identity Theft Protection
  • Employee Assistance Plan
  • Flexible Spending Accounts
  • Health Savings Accounts
  • Wellness Programs
  • Educational Assistance
  • Relocation Assistance
  • Employee Discounts

On-site amenities such as fitness facilities, banking, and cafeteria services are also available.


Application Process

Submission Guidelines

The position remains open for a minimum of five days and closes once a qualified candidate is identified.


File Format Requirements

Accepted resume formats include Word (.doc, .docx), unsecured PDF (.pdf), Rich Text Format (.rtf), and HTML (.htm, .html), with a size limit of 5MB.

Resumes from third-party vendors will not be accepted.


Equal Opportunity Employment

ORNL is an equal opportunity employer. Qualified applicants, including individuals with disabilities and protected veterans, are encouraged to apply.

UT-Battelle is an E-Verify employer.

🚀 Apply Now


Conclusion

This cyber security research position represents more than just a job — it’s a mission-driven career opportunity. From identifying software vulnerabilities in critical systems to presenting findings to leadership, the role demands technical excellence, curiosity, and dedication.

If you have a strong foundation in cyber security, programming expertise, and a passion for protecting national infrastructure, this opportunity offers both challenge and impact. It’s where research meets responsibility — and where innovation supports national security.


FAQs

1. What degree is required for this position?

A bachelor’s degree in computer science, computer engineering, or a related field is required.

2. Is programming experience mandatory?

Programming experience is preferred, especially in C, C++, Python, and Java.

3. Are security clearances required?

Yes, the position requires the ability to obtain and maintain HSPD-12 PIV and SCI clearances.

4. Is visa sponsorship available?

No, visa sponsorship is not available for this position.

5. Are cyber competition experiences valuable?

Yes, participation in capture-the-flag or cyber challenge events is considered a plus.


Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button