Cyber Warfare Technician

U.S. Navy
Mercer Island, WA, United States
Full-time
Part-time

To be eligible to enlist in the U.S. Navy, candidates must be between the ages of 18-34

As a Cryptologic Technician, you are one of the worlds greatest problem-solvers. Were looking for people with sharp minds, whose brains are built for picking out patterns most will miss.

CRYPTOLOGY JOBS IN THE NAVY

CRYPTOLOGIC TECHNICIAN COLLECTION

Much about your role is classified. What we can tell you is this : you will intercept signals to provide tactical and strategic intelligence, technical guidance and information to ships and special warfare units.

CRYPTOLOGIC TECHNICIAN INTERPRETIVE

Languages are more than just communicationtheyre cultural codes that need to be analyzed and, in some cases, broken. The Defense Language School in Monterey, California will fully immerse you in the language for your choicefrom Mandarin to Spanish and Arabic to Russian.

CRYPTOLOGIC TECHNICIAN MAINTENANCE

Troubleshoot top-secret equipment vital to national security, taking your passion for science and engineering to the next level.

CRYPTOLOGIC TECHNICIAN NETWORKS

Use state-of-the-art technology to perform offensive and defensive cyber operations, investigating and tracking enemies while also protecting our networks from attacks.

CRYPTOLOGIC TECHNICIAN TECHNICAL

Provide tactical guidance to special warfare operations and to ships across the fleet. Use high- power jamming signals to deceive electronic sensors and prevent enemy attacks.

PAY AND BENEFITS

From the day you start, youll receive :

Competitive salary

Potential to earn a bonus upon enlistment

Free health insurance

Free housing

A retirement plan

Paid training

College credit

EDUCATION OPPORTUNITIES

Navy College Program and Tuition Assistance

Post-9 / 11 GI Bill, up to 100% tuition

Professional credentials and certifications

College credit hours toward a bachelors or associate degree through the American Council on Education

QUALIFICATIONS AND REQUIREMENTS

U.S. citizen

High school graduate or equivalent

17 years of age or older

Applicants must also meet eligibility requirements for a Top Secret / Sensitive Compartmented Information security clearance.

Normal color perception, sight, speech and hearing are required.

General qualifications may vary depending upon whether youre currently serving, whether youve served before or whether youve never served before.

WORK ENVIRONMENT

Cryptologic Technicians perform a variety of duties worldwide, at numerous overseas and stateside shore commands, aboard surface ships, aircraft and submarines and with Naval Special Warfare.

They generally divide time between assignments ashore and afloat.

PART-TIME OPPORTUNITIES

Serving part-time as a Navy Reserve Sailor, your duties will be carried out during your scheduled drilling and training periods.

During monthly drilling, Cryptologic Technicians in the Navy Reserve typically work at a location close to their homes.

Take a moment to learn more about the general roles and responsibilities of Navy Reserve Sailors

Required

Preferred

Job Industries

  • Government & Military
  • 10 hours ago
Related jobs
Promoted
Navy
WA, United States

Each CT role works under the oversight of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required) – and potentially both. As a CT, you may work independently or as part of small, coordinated teams – ultimately under the supervision of Informati...

Promoted
U.S. Navy
Medina, Washington

Cryptologic Technicians perform a variety of duties worldwide, at numerous overseas and stateside shore commands, aboard surface ships, aircraft and submarines and with Naval Special Warfare. As a Cryptologic Technician, you are one of the worlds greatest problem-solvers. CRYPTOLOGIC TECHNICIAN COLL...

Promoted
US Navy
Seattle, Washington

Those seeking a Cyber Warfare Technician position must be U. ...

Promoted
VirtualVocations
Seattle, Washington

A company is looking for a Help Desk Technician (Tier 1) to provide technical support and maintain IT equipment. ...

Promoted
Charlie's Produce
Seattle, Washington

Experience as a help desk technician or other customer support role within an IT department. Manage Help Desk tickets in a timely and courteous manner. With a team of dedicated people who are passionate about food, supply chain, and their community we are looking for likeminded individuals to help f...

Promoted
U.S. Navy
Kenmore, Washington

Cryptologic Technicians perform a variety of duties worldwide, at numerous overseas and stateside shore commands, aboard surface ships, aircraft and submarines and with Naval Special Warfare. As a Cryptologic Technician, you are one of the worlds greatest problem-solvers. CRYPTOLOGIC TECHNICIAN COLL...

The Archdiocese of Seattle
Seattle, Washington

As a Help Desk Technician, you will provide Tier 1 support to our customers via phone, email and Teams chat. Manage Help Desk tickets in a timely manner. Each position employed in the Chancery helps to extend the ministry of the Archbishop in particular ways as outlined in the position description. ...

Slalom
Seattle, Washington

Our fast-paced, highly collaborative Information Security & Governance team is hiring an Information Security Analyst to help enable the Slalom brand by protecting the confidentiality, integrity, and availability of Slalom and our clients' data. The successful candidate will be responsible for contr...

Costco Wholesale
Issaquah, Washington

Security Analysts research attempted/successful efforts to compromise systems security; design countermeasures; implement and maintain physical, technical, and administrative security controls; and provide information to management regarding the negative impact to the business. The Analyst advocates...

Starbucks
Seattle, Washington

Now Brewing – information security corrective action data analyst! #tobeapartner . As an information security corrective action data analyst, you will…. Certifications such as CISSP, CISA, CIPP, or others focused on information security, data privacy or information risk management is desired. This d...