Website Closedloop Communications

All candidates must have (minimally) a Top-Secret clearance with SCI eligibility. 

(Preference:  TS/SCI with a Full Scope Polygraph)

Description:

Perform hands-on interactive vulnerability assessments in order to mitigate possible or real-time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.

Provide technical security assessments of applications and infrastructure, security design reviews as well as risk assessments. This is a hands-on role, requiring technical skills from the hardware to the application layer.

Possess knowledge and expertise in security best practices, vulnerability analysis, network defense tactics and techniques.

Perform information security event analysis. Knowledge and experience with information network software and hardware.

Assess information network threats such as computer viruses, exploits, and malicious attacks.

Work in a team environment to conduct research/analysis of current and emerging Cyber Threats.

Define requirements, test concepts, test equipment, and data collection requirements for assessments and tests.

Required capabilities:

Perform vulnerability assessments and identify mitigation strategies related to possible cyber related threats on specified systems;

Conduct technical and risk assessments of Information Technology and Operational Technology (hardware, software, firmware);

Perform vulnerability threat analysis on information networks;

Perform vulnerability analysis on specified systems;

Conduct threat and risks assessment to determine if protection mechanisms in place meet the required security objectives;

Perform vulnerability threat analysis on specified systems; and

Assess if advanced information security fundamental standards are in place on specified systems.

Qualifications:

Five (5) years’ experience as Cyber Operations Specialist on programs and contracts of similar scope, type, and complexity is required. Bachelor’s degree in Computer Science, Cybersecurity, or other InfoSec discipline from an accredited college or university is required.

CERTIFICATION: DoDD 8140 (8570) IAT Level III (CASP+ CE, CCNP Security, CISA, CISSP, GCED, or GCIH)

CLICK HERE TO APPLY TODAY

© 2020 All Rights Reserved