Weeghman & Briggs, LLC ยท 7 hours ago
Systems Vulnerability Analyst- all levels with Security Clearance
Maximize your interview chances
ConsultingGovernment
No H1BSecurity Clearance Required
Insider Connection @Weeghman & Briggs, LLC
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Ability to identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Ability to characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and mission supported by those systems.
Able to Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
Knowledge of agency specific tools and methodologies
Strong critical thinking and collaboration skills
Information Assurance Certification may be required.
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Ability to identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
Ability to characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and mission supported by those systems.
Able to compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
Knowledge of agency specific tools and methodologies.
Strong critical thinking and collaboration skills.
Information Assurance Certification may be required.
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
Network and system administration may account for some, but not all, of the experience.
Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security).
Military or applicable government work experience in lieu of technical degree.
Applicants must possess a TS/SCI clearance with polygraph to be considered for the position.
Preferred
Experience with Advanced Persistent Threats.
Experience with scripting languages, including C Shell, BASH, Python, or Perl.
Knowledge of CNO and CNE methodologies and tradecraft.
Familiarity with dataflow and SIGINT architecture.
Experience with external engagements and stakeholder collaboration.
Knowledge of processes and tools related to SIGINT discovery analysis.
Applicable Certifications.
Completion of military training in a relevant area, including Joint Cyber Analysis course (JCAC), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC) and Intermediate Network Warfare Training (INWT), or Cyber Defense Operations.
Military training in networking, computer science, or cyber topics.
Company
Weeghman & Briggs, LLC
Weeghman & Briggs, LLC is a veteran-owned small business trusted by its clients to provide Data Analysis, Cyber Security, Telematics Solutions, and Training Services to gain the edge against their competition in the Cyber Realm.