Cyber Network Analysis Tech

PeratonSpringfield, VA
3d$80,000 - $128,000Onsite

About The Position

Peraton is seeking a Cyber Network Analysis Tech onsite in Springfield, VA: Performs assessments of systems and networks within the networking environment or enclave and identifies systems and networks that deviate from acceptable configurations, enclave policy, or local policy. Evaluates incident response procedures and capabilities. Exploits system and network vulnerabilities and misconfigurations for purposes of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities. Leverages computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision. Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs. Establishes a framework by which cyber risk can be measured and quantified in the marketplace. Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates. Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation. Verifies security systems by developing and implementing test scripts. Mains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs. Responsible for the design, development, implementation, and integration of a DoD IA architectures, systems, or system components for use within computing, network, and enclave environments. Ensures that the architecture and design of development and operational systems are functional and secure. This includes designs for program of record systems and special purpose processing nodes with platform IT interconnectivity.

Requirements

  • Requires an active TS/SCI level clearance
  • Bachelor’s degree and 2-5 years of experience; or Masters degree and 0 years; or Associate’s degree and 4 years’ experience; or HS diploma/equivalent and 6 years experience

Responsibilities

  • Performs assessments of systems and networks within the networking environment or enclave and identifies systems and networks that deviate from acceptable configurations, enclave policy, or local policy.
  • Evaluates incident response procedures and capabilities.
  • Exploits system and network vulnerabilities and misconfigurations for purposes of gathering data from target or adversary automated information systems or networks and to enable operations and intelligence collection capabilities.
  • Leverages computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
  • Monitors, analyzes, and detects cyber events and incidents within information systems and networks under general supervision.
  • Assists with integrated, dynamic cyber defense, coordinates and maintains security toolsets to support organizations’ continuous monitoring and ongoing authorization programs.
  • Establishes a framework by which cyber risk can be measured and quantified in the marketplace.
  • Determines security requirements by evaluating business strategies and requirements; researching information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture/platform; identifying integration issues; preparing cost estimates.
  • Implements security systems by specifying intrusion detection methodologies and equipment; directing equipment and software installation and calibration; preparing preventive and reactive measures; creating, transmitting, and maintaining keys; providing technical support; completing documentation.
  • Verifies security systems by developing and implementing test scripts.
  • Maintains security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; developing and conducting training programs.
  • Responsible for the design, development, implementation, and integration of a DoD IA architectures, systems, or system components for use within computing, network, and enclave environments.
  • Ensures that the architecture and design of development and operational systems are functional and secure.
  • This includes designs for program of record systems and special purpose processing nodes with platform IT interconnectivity.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service