Battelle delivers when others can’t. We conduct research and development, manage laboratories, design and manufacture products and deliver critical services for our clients—whether they are a multi-national corporation, a small start-up or a government agency.
We recognize and appreciate the value and contributions of individuals with diverse backgrounds and experiences and welcome all qualified individuals to apply.
Battelle’s Trust and Assurance Cyber Analytics Department is seeking a Senior Cyber Applied Mathematician to work in our Columbus, Ohio location.
“From Silicon to Systems” – We are an elite, multi-disciplinary team, bringing together the brightest minds from physics, computer science, electrical engineering, and mathematics to develop unique embedded security solutions for government and industrial customers.
Battelle has been trusted by elite government clients to solve some of the world’s hardest security problems. We work in small agile teams to push the bounds of computing technology. Our high-powered labs include specialized software and hardware, so our engineers have everything they need to invent new Cyber solutions. As a Mathematician at Battelle you will have the opportunity to hone your skills analyzing hard mathematical problems that arise from physical and software systems. Daily activities include algorithm implementation, mathematical analysis while working closely with engineers.
Our team is casual putting results over formality. Team members can work flexible hours, and Battelle maintains a 9/80 schedule meaning employees have a chance to take every other Friday off. We encourage new ideas with our large Internal Research and Development (IRAD) program where engineers work on projects they are passionate about. Inventors and innovators are rewarded by our industry leading IP compensation program. Our group works collaboratively with many parts of Battelle’s larger organization on projects ranging from genomics to robotics.
- Lead the design and implementation of machine learning, data mining, data fusion, and data engineering techniques applied to cyber security problems
- Learn and become fluent in the details of security related domains in order to devise data driven solutions – this can range from software fuzzing to micro-electronic supply chain analysis
- Improve existing techniques and devise new techniques to solve security data problems
- Independently propose and develop creative solutions to unique problems, potentially leading IR&D projects
- Identify and articulate strengths and weaknesses of solutions, conclusions and problem approaches during technical discussions.
THE FOLLOWING IS REQUIRED
- Bachelor’s degree in STEM field (Statistics, Physics, Computer Science, Mathematics, Electrical Engineering, or similar) with 8+ years’ of experience
- Advanced degree in STEM field (Statistics, Physics, Computer Science, Mathematics, Electrical Engineering, or similar)
- Expertise in one or more of the following areas:
- Algebra, Number Theory, or Graph Theory
- Cryptography or Quantum Computing
- Theory of Machine Learning (especially deep and reinforcement learning)
- Numerical Analysis or High-Performance Computing
- Symbolic Computation or Solvers
- Dynamical Systems / Control Theory
- Signal or Image Processing
- Demonstrated experience developing in either Python or R.
- Experience solving complex data problems
- Experience applying machine learning, statistics and/or data mining techniques
- Excitement about learning new technical subject areas and curiosity about cyber security problems
- Must be a sole US citizen with the ability to obtain and maintain a US government security clearance.
- Experience with deep learning methods and with microelectronic design workflow
- Electronics bench skills such as digital and analog test & measurement
- Ability to generate verification test benches for simulating and validating microelectronic designs
- Experience in vulnerability analysis for either software or hardware
- Understanding of VHDL and/or Verilog hardware description languages.
- Familiarity with compiled languages like C, C++, or rust
- Familiarity with shell scripting languages like bash, zsh, or csh
- Active Secret or Top-Secret Clearance