CYBER VULNERABILITY ASSESSMENT ANALYST-CNE (NGA)

at  Quantum Research Intl

Springfield, VA 22150, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate23 Aug, 2024Not Specified24 May, 2024N/ACryptography,Ethics,Risk,Escalation,Access,Testing Tools,Nmap,Ethical Hacking,Cfr,Penetration Testing,Regulations,Data Security,Scanning,Replay,InjectionsNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Job Description:

REQUIREMENTS:

  • Bachelor’s degree (technically relevant degree preferred). In lieu of degree, CFR, Cloud+, CySA+, GCED, GICSP, or PenTest+ may be accepted.
  • Knowledge of Government standards for data security such as markings, handling of classified and unclassified information, and how to handle the distribution of this information.
  • Knowledge of computer networking concepts and protocols, and network security methodologies, risk management processes (e.g., methods for assessing and mitigating risk), and laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
  • Knowledge of cyber threats and vulnerabilities, and operational impacts of cybersecurity lapses.
  • Knowledge of cryptography and cryptographic key management concepts and host/network access control mechanisms (e.g., access control list, capabilities list).
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
  • Knowledge of what constitutes a network attack and a network attack’s relationship to both threats and vulnerabilities.
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • TS/SCI eligible, subject to CI Polygraph.
  • IAM or IAT Level 2.

DESIRED/PREFERRED SKILLS:

  • Conducting vulnerability scans and recognizing vulnerabilities in security systems.
  • Assessing the robustness of security systems and designs.
  • Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
  • Mimicking threat behaviors and the use of penetration testing tools and techniques.
  • Using network analysis tools to identify vulnerabilities. (e.g., fuzzing, Nmap, etc.).
  • Reviewing logs to identify evidence of past intrusions and conducting application vulnerability assessments.
  • Conducting ethical hacking and penetration testing following established principles and techniques.

The ideal candidate will assist the customer in providing technical and engineering support to sensitive and highly regulated CNE operations designed to identify vulnerabilities subject to Advanced Persistent Threats (APT) or other emerging, time sensitive cyber threats on the customers networks. This includes:

  • Performing assessments of systems and networks within the network environment or enclave and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
  • Developing measures of effectiveness for defense-in-depth architectures against known vulnerabilities.
  • Identifying systemic security issues based on the analysis of vulnerability and configuration data.
  • Applying programming language structures (e.g., source code review) and logic.
  • Sharing meaningful insights about the context of an organization’s threat environment that improve its risk management posture.
  • Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)

How To Apply:

Incase you would like to apply to this job directly from the source, please click here

Responsibilities:

The ideal candidate will assist the customer in providing technical and engineering support to sensitive and highly regulated CNE operations designed to identify vulnerabilities subject to Advanced Persistent Threats (APT) or other emerging, time sensitive cyber threats on the customers networks. This includes:

  • Performing assessments of systems and networks within the network environment or enclave and identifying where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
  • Developing measures of effectiveness for defense-in-depth architectures against known vulnerabilities.
  • Identifying systemic security issues based on the analysis of vulnerability and configuration data.
  • Applying programming language structures (e.g., source code review) and logic.
  • Sharing meaningful insights about the context of an organization’s threat environment that improve its risk management posture.
  • Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).


REQUIREMENT SUMMARY

Min:N/AMax:5.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Proficient

1

Springfield, VA 22150, USA