This job board retrieves part of its jobs from: Toronto Jobs | Emplois Montréal | IT Jobs Canada

Find jobs in Texas today!

To post a job, login or create an account |  Post a Job

  Jobs in Texas  

Bringing the best, highest paying job offers near you

previous arrow
next arrow
Slider

Cyber Protection Team – National with Security Clearance

Software Engineering Services

This is a Contract position in Lackland Afb, TX posted April 21, 2022.

Software Engineering Services is looking for a National Cyber Operator (Host / Network) to support our DCRIOS project in San Antonio, TX at Lackland AFB. This requires a TS/SCI clearance and a CI Poly. Certification requirements include: Must meet DoD 8570 IAT Level 3 requirements ; Linux CLI; and have or be able to obtain an OS Cert (Microsoft or Linux) within 6 months of start. Approximately 25% travel will also be required. If you are qualified or interested, please forward your resume and details to Job Description: seeking cyber operators with hands-on Intrusion Detection System (IDS) and forensic analyst experience. In support of National Cyber Protection Team (CPT) operations, candidates will serve as Cyber Operators filling either a Cyber Security Network Analyst position or Cyber Security Host Analyst position. The operator will conduct network navigation, tactical forensic analysis, collection of valuable operational data, and when directed, execute operations in support of defensive initiatives. Operators will provide support for persistent monitoring of all designated networks, enclaves, and systems. Candidate may be required to interpret, analyze, and report findings in accordance with computer network directives, including initiating, responding, and reporting discovered events. Candidates may be required to manage and execute first-level responses and address reported or detected incidents. Candidate will participate in project review meetings and provide technical INFOSEC guidance and updates; document policies, procedures, and lessons learned accordingly. Candidates must possess excellent written and verbal communication skills. Required Qualifications: • Minimum Bachelor’s degree and 2 years’ experience, Associates degree with 4 years’ experience or 6 years’ equivalent experience without a degree; degrees focused on engineering or applied science. Other degrees with strong computer technology curriculum may be considered • General knowledge of physical computer components and architectures, including the functions of various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols, security hardware and software. • Must meet DoD 8570 IAT Level 3 requirements • Active TS/SCI clearance; National Team positions will require successful Counter Intelligence Polygraph Examination (completed after hire)
• Must complete self-assessment questionnaire, customer pre-screen, skills assessment lab, pass the training and certification program(s) as dictated by the customer, and remain mission ready qualified • Candidate should be self-motivated with minimal supervision
• Proficiency in writing, editing, executing scripts on Windows, Linux, UNIX systems. Experience with one or more of the following is required: • Experience with toolsets such as Wireshark, ELK, Moloch, Metasploit, tcpdump, NMap, Nessus, Snort, Bro, EnCase, Forensic Toolkit, Windows Fundamentals, UNIX fundamentals, exploitation theory, privilege escalation, evidence removal
• Experience with Cyber Threats Detection and Mitigation, Behavioral Malware Analysis
• Experience with, Advanced Network Traffic Analysis, Malicious Network Traffic Analysis
• Have strong UNIX/Linux fundamentals along with familiarity of UNIX/Linux/Windows Command Line Interface (CLI)
• Demonstrated ability to methodically analyze problems and identify potential solutions
• Ability to explain, present, demonstrate (when applicable) and document the operational impact of a particular vulnerability or exploit
• Ability to assist customer with implementing policies and tactics, techniques and procedures for conducting assessments
• Familiarity with NIST, DISA STIGS and experience in conducting DoD vulnerability and compliance assessments
• Possess or be willing to obtain within 6-months of start date if not already possessed – Operating System Certification; Microsoft or Linux Additional Qualifications (preferred): • Experience programming in assembly, compiled, and interpreted languages.
• Experience with encryption and decryption such as PGP, DES, AES, RSA, and PKI.
• Knowledge of distributed systems, process control, advanced routing, wireless, telecom and datacom platforms.
• Experience programming in C, C++, C#, Ruby, Perl, Python, SQL. • Certifications such as GXPN, GREM CCNA, CCNP, CCIE, GCFA, GNFA, RHCE, CompTIA, LPT, OSCP, GXPN, GREM CEH, Security+, MCP, and SANS GPEN a plus
• Experience working with correlation environment tools (i.e., ArcSight)

Please add your adsense or publicity code here (inc/structure/adsfooter.php)