Applied Research Associates-posted 3 months ago
Full-time • Mid Level
Fort Belvoir, VA
1,001-5,000 employees
Professional, Scientific, and Technical Services

The Mission Concepts and Capabilities (MCC) Division of Applied Research Associates, Inc. (ARA) has teams conducting cyber assessments of vulnerabilities of critical U.S. and Allied systems, networks, infrastructures, and assets. Our team supports the Defense Threat Reduction Agency's Nuclear Enterprise Support Directorate (NE)'s Mission Assurance Department (MA) program. We are seeking hands-on cyber analysts with an understanding of both the compliance standards and the tools and techniques to assess vulnerabilities to be a part of our team. Assessment teams identify risks that may lead to mission loss or degradation and provide recommendations for risk reduction and management based on DoD Mission Assurance Assessment benchmarks. Teams identify threats to information technology and operational technology and assess the vulnerability and risk to assets. Selected candidates will apply in-depth knowledge of cyber threats to develop recommendations to remediate system vulnerabilities. Our teams provide a balanced look at the mission survivability of key DoD facilities and provide recommendations with supporting rationale to leadership. Teams also perform assessments from an adversarial viewpoint to identify weaknesses, test and evaluate protection strategies, and demonstrate exploitation of identified vulnerabilities. Components of these assessments include but are not limited to examining telecommunications (e.g., video, voice and data, commercial and military) and cyber space operations (e.g., computer networks, IA tools use, operations security). Cyber assessment teams may be deployed to high-threat but permissive environments anywhere in the world. Each team can support up to 10 assessments per year that range from one to six weeks in duration, from start to submission of final assessment report. This position is contingent upon a program expansion/opening and customer approval of the candidate's resume.

  • Conduct cyber assessments of vulnerabilities of critical U.S. and Allied systems, networks, infrastructures, and assets.
  • Identify risks that may lead to mission loss or degradation.
  • Provide recommendations for risk reduction and management based on DoD Mission Assurance Assessment benchmarks.
  • Assess threats to information technology and operational technology.
  • Develop recommendations to remediate system vulnerabilities.
  • Perform assessments from an adversarial viewpoint to identify weaknesses.
  • Test and evaluate protection strategies.
  • Demonstrate exploitation of identified vulnerabilities.
  • Examine telecommunications and cyber space operations.
  • Bachelor's degree or higher in computer science, information technology, cyber security, computer engineering, electrical engineering, or related discipline plus 4 years' experience (10 years' relevant experience can serve as a substitute for degree requirements).
  • Current / Active Top Secret security clearance with the ability to obtain and maintain SCI access.
  • Active certifications required - IAT II as described in DoDD 8570.01 and CSSP Auditor (Security+, CySA+, Pentest+).
  • Demonstrated experience with Linux environments (Red Hat, CentOS, Ubuntu).
  • Understanding of information technology threats, and cybersecurity practices.
  • Hands-on experience with security monitoring, threat hunting, packet analysis, malware analysis, signature development, and/or shell scripting.
  • Hands-on experience with network monitoring and packet inspection tools.
  • Programming experience (Perl, Python, C, etc.).
  • Knowledge, skills, and ability to operate the advanced cyber analytical toolkit and perform required assessments.
  • Working knowledge of Department of War's IT system and network certification and accreditation processes to include system security authorization agreements.
  • Experience conducting Information Operations Computer Network Defense/Exploitation assessments.
  • Experience with firewalls and network TAP technologies.
  • Experience installing, configuring, and administering software applications.
  • Demonstrated skills in troubleshooting problems with software and hardware.
  • Experience configuring, managing, and maintaining networking equipment.
  • Knowledge of Department of Warfare's information assurance policies and procedures.
  • Experience in Vulnerability Alert processes.
  • Working knowledge of Computer Network vulnerability/compliance analysis software.
  • Employee Stock Ownership Plan (ESOP)
  • Tools, training, and opportunities for active roles as owners.
  • Challenging culture that encourages innovation and experimentation.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service