Visit www.acad.jobs with all Jobs for Academics!
                
Position: Data Scientist
Institution: Carnegie Mellon University
Location: Pittsburgh, Pennsylvania, United States
Duties: Our team works on a wide range of projects. Some of our current work includes developing metrics and experimental designs for large-scale cyber security research programs, researching human-in-the-loop machine learning, and building classifiers to identify security vulnerabilities in code. Additionally, we have burgeoning work in deep fake video creation and detection, quantum computing, and natural language processing. We have access to a wide variety of cyber-related data, including malware samples, netflow data, cyber security training runs and tests, incident tickets, and more. If you are a data science or statistics expert with an interest in cyber security, we want to hear from you!
Requirements: BS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with eight (8) years of experience or equivalent combination of training or experience; or MS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with five (5) years of experience; or PhD in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with two (2) years of experience; Deep understanding of statistical modeling techniques and advanced data analytics; Proficient with at least one mathematical/statistical programming package (e.g., R, python numpy/scipy/pandas, MATLAB, etc.); Expertise in one or more of the following: machine learning techniques (e.g., K-means, SVM, neural networks), quantum computing, deep fake videos, cryptography, data visualization, natural language processing
   
Text: Skip navigation and jump directly to page contentCareers@CarnegieMellonWhy Carnegie Mellon?Benefits at a GlanceDiversity and InclusionWork/LifeLiving in PittsburghDual CareersProspective Employee DisclosuresNeed Assistance?Frequently Asked QuestionsHuman ResourcesJob PostingsNeed Assistance?Go to the main content section.|My Account Options|Sign InThis service is set to disconnect automatically after {0} minutes of inactivity. Your session will end in {1} minutes.Click OK to reset the timer to {0} minutes.You have been signed out.This service is set to sign out after {0} minutes of inactivity.Job SearchMy JobpageBasic Search|My Submissions|My Job Cart|My Saved Searches|Beginning of the main content section.Return to the home pagePrintable FormatReturn to previous position on page -Description: Qualifications: : Job Function: Primary Location: : Public Referral Bonus: : : Refer a friend for this jobRefer a friendRefer a candidateSubmit a candidate's profile ('requisitionDescriptionInterface', 'descRequisition', ['105442','true','105442','false','Submission for the position: Data Scientist - (Job Number: 2015431)','false','105442','false','true','https://cmu.taleo.net/careersection/jobdetail.ftl?job=2015431%26lang=en','Data Scientist','true','Data Scientist','2015431','%3Cp style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EWhat We Do:%3C/strong%3E%3C/span%3E%3C/p%3E%0A%0A%3Cdiv%3E%3Cbr /%3E%0A%3Cspan style=%22font-size:small%22%3EData Scientists at the SEI use advanced analytics, data science, artificial intelligence, and machine learning to help our government and industry clients research and solve cyber security challenges. In this role, you will work with our customers to identify areas where advanced statistical techniques can help tackle problems, plan and develop prototype solutions, and build out final products. You%26#39;ll get a chance to work with elite cyber security professionals and university faculty to build new technologies that will influence national cyber security strategy for decades to come. You will co-author research proposals, execute studies, and present findings to DoD sponsors and at academic conferences.%3Cbr /%3E%0A%3Cbr /%3E%0AOur team works on a wide range of projects. Some of our current work includes developing metrics and experimental designs for large-scale cyber security research programs, researching human-in-the-loop machine learning, and building classifiers to identify security vulnerabilities in code. Additionally, we have burgeoning work in deep fake video creation and detection, quantum computing, and natural language processing. We have access to a wide variety of cyber-related data, including malware samples, netflow data, cyber security training runs and tests, incident tickets, and more. If you are a data science or statistics expert with an interest in cyber security, we want to hear from you!%3C/span%3E%3Cbr /%3E%0A%3Cbr /%3E%0A%3Cstrong%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3ERequirements:%3C/span%3E%3C/span%3E%3C/span%3E%3C/strong%3E%3C/div%3E%0A%0A%3Cdiv%3E%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EBS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with eight (8) years of experience or equivalent combination of training or experience; or MS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with five (5) years of experience; or PhD in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with two (2) years of experience.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EWillingness to complete modest travel to various locations to support the SEI%26rsquo;s overall mission.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EYou will be subject to a background check and will need to obtain and maintain a U.S. Department of Defense security clearance.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EKnowledge, Skills and Abilities:%3C/strong%3E%3C/span%3E%3Cbr /%3E%0A%26nbsp;%3C/div%3E%0A%0A%3Cdiv%3E%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EDeep understanding of statistical modeling techniques and advanced data analytics%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EProficient with at least one mathematical/statistical programming package (e.g., R, python numpy/scipy/pandas, MATLAB, etc.)%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExpertise in one or more of the following: machine learning techniques (e.g., K-means, SVM, neural networks), quantum computing, deep fake videos, cryptography, data visualization, natural language processing%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EInnovative and inquisitive with ability to imagine novel analytical solutions to problems%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EThrives in a multi-disciplinary environment%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3EStrong communication skills%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EDesired Experience:%3C/strong%3E%3C/span%3E%0A%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience in predictive modeling, data science, or machine learning%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience applying software engineering techniques in solution development%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience in cybersecurity and privacy is a plus%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EDemonstrated ability to learn new concepts and grow into new areas of work%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience supporting test and evaluation for large-scale government research programs is a plus%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%0A%3Cp style=%22font-family:Arial%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3E%3Cspan style=%22font-size:medium%22%3E%26nbsp;%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EMore Information%3C/strong%3E%3Cbr /%3E%0A%3Cbr /%3E%0APlease visit %3Ca href=%22http://“Why Carnegie Mellon” %22%3E%26ldquo;Why Carnegie Mellon%26rdquo; %3C/a%3Eto learn more about becoming part of an institution inspiring innovations that change the world.%3Cbr /%3E%0AA listing of employee benefits is available at: %3Ca href=%22http://www.cmu.edu/jobs/benefits-at-a-glance/.%22%3Ewww.cmu.edu/jobs/benefits-at-a-glance/.%3C/a%3E%3C/span%3E%0A%0A%3Cp style=%22font-family:Arial; margin-bottom:0px; margin-top:0px%22%3E%3Cstrong%3E%3Cspan style=%22font-size:small%22%3ECarnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.%3C/span%3E%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/p%3E%0A%3Cspan style=%22font-size:medium%22%3E %3C/span%3E%3C/div%3E%0A','%3Cp style=%22font-family:Arial%22%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EWhat We Do:%3C/strong%3E%3C/span%3E%3C/p%3E%0A%0A%3Cdiv%3E%3Cbr /%3E%0A%3Cspan style=%22font-size:small%22%3EData Scientists at the SEI use advanced analytics, data science, artificial intelligence, and machine learning to help our government and industry clients research and solve cyber security challenges. In this role, you will work with our customers to identify areas where advanced statistical techniques can help tackle problems, plan and develop prototype solutions, and build out final products. You%26#39;ll get a chance to work with elite cyber security professionals and university faculty to build new technologies that will influence national cyber security strategy for decades to come. You will co-author research proposals, execute studies, and present findings to DoD sponsors and at academic conferences.%3Cbr /%3E%0A%3Cbr /%3E%0AOur team works on a wide range of projects. Some of our current work includes developing metrics and experimental designs for large-scale cyber security research programs, researching human-in-the-loop machine learning, and building classifiers to identify security vulnerabilities in code. Additionally, we have burgeoning work in deep fake video creation and detection, quantum computing, and natural language processing. We have access to a wide variety of cyber-related data, including malware samples, netflow data, cyber security training runs and tests, incident tickets, and more. If you are a data science or statistics expert with an interest in cyber security, we want to hear from you!%3C/span%3E%3Cbr /%3E%0A%3Cbr /%3E%0A%3Cstrong%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3ERequirements:%3C/span%3E%3C/span%3E%3C/span%3E%3C/strong%3E%3C/div%3E%0A%0A%3Cdiv%3E%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EBS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with eight (8) years of experience or equivalent combination of training or experience; or MS in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with five (5) years of experience; or PhD in data science, machine learning, computer science, statistics, or related highly-quantitative discipline with two (2) years of experience.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EWillingness to complete modest travel to various locations to support the SEI%26rsquo;s overall mission.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EYou will be subject to a background check and will need to obtain and maintain a U.S. Department of Defense security clearance.%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EKnowledge, Skills and Abilities:%3C/strong%3E%3C/span%3E%3Cbr /%3E%0A%26nbsp;%3C/div%3E%0A%0A%3Cdiv%3E%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EDeep understanding of statistical modeling techniques and advanced data analytics%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EProficient with at least one mathematical/statistical programming package (e.g., R, python numpy/scipy/pandas, MATLAB, etc.)%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExpertise in one or more of the following: machine learning techniques (e.g., K-means, SVM, neural networks), quantum computing, deep fake videos, cryptography, data visualization, natural language processing%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EInnovative and inquisitive with ability to imagine novel analytical solutions to problems%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EThrives in a multi-disciplinary environment%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3EStrong communication skills%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EDesired Experience:%3C/strong%3E%3C/span%3E%0A%0A%3Cul%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience in predictive modeling, data science, or machine learning%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience applying software engineering techniques in solution development%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience in cybersecurity and privacy is a plus%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EDemonstrated ability to learn new concepts and grow into new areas of work%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A %3Cli%3E%3Cspan style=%22font-style:normal%22%3E%3Cspan style=%22font-weight:normal%22%3E%3Cspan style=%22tab-stops:list .5in%22%3E%3Cspan style=%22font-size:10pt%22%3E%3Cspan%3EExperience supporting test and evaluation for large-scale government research programs is a plus%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/span%3E%3C/li%3E%0A%3C/ul%3E%0A%0A%3Cp style=%22font-family:Arial%22%3E%3Cspan style=%22color:black%22%3E%3Cspan%3E%3Cspan style=%22font-size:medium%22%3E%26nbsp;%3C/span%3E%3C/span%3E%3C/span%3E%3C/p%3E%0A%3C/div%3E%0A%0A%3Cdiv%3E%3Cspan style=%22font-size:small%22%3E%3Cstrong%3EMore Information%3C/strong%3E%3Cbr /%3E%0A%3Cbr /%3E%0APlease visit %3Ca href=%22http://“Why Carnegie Mellon” %22%3E%26ldquo;Why Carnegie Mellon%26rdquo; %3C/a%3Eto learn more about becoming part of an institution inspiring innovations that change the world.%3Cbr /%3E%0AA listing of employee benefits is available at: %3Ca href=%22http://www.cmu.edu/jobs/benefits-at-a-glance/.%22%3Ewww.cmu.edu/jobs/benefits-at-a-glance/.%3C/a%3E%3C/span%3E%0A%0A%3Cp style=%22font-family:Arial; margin-bottom:0px; margin-top:0px%22%3E%3Cstrong%3E%3Cspan style=%22font-size:small%22%3ECarnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran.%3C/span%3E%3C/strong%3E%3Co:p%3E%3C/o:p%3E%3C/p%3E%0A%3Cspan style=%22font-size:medium%22%3E %3C/span%3E%3C/div%3E%0A','','','','','Cyber Security','Cyber Security','United States-Pennsylvania-Pittsburgh','United States-Pennsylvania-Pittsburgh','Full Time','Full Time','','','false','Bachelor%27s Degree','Bachelor%27s Degree','','','false','105442','105442','true','105442','false','Submission for the position: Data Scientist - (Job Number: 2015431)','false','105442','false','true','https://cmu.taleo.net/careersection/jobdetail.ftl?job=2015431%26lang=en','Data Scientist','true']); Human Resources - CareersWhitfield Hall, 143 North Craig Street, Pittsburgh, PA 15213(412) 268-3386 Carnegie Mellon University is an Equal Opportunity Employer/Disability/Veteran Human ResourcesCarnegie Mellon Home
Please click here, if the Job didn't load correctly.







Please wait. You are being redirected to the Job in 3 seconds.