Cybersecurity Analyst Senior - CYBA3

ECS Tech IncClarksburg, WV
12h$127,500 - $138,224Hybrid

About The Position

ECS is seeking a Cybersecurity Analyst Senior - CYBA3 to work in our Clarksburg, WV office. Cybersecurity Analyst Senior - CYBA3, the resource will be a FT hybrid remote and onsite in Clarksburg, WV. The expectation will be at least 3 days per week physically onsite. Functions as a technical expert who provides tactical planning, team management, threat emulation, and stakeholder communication, within a fast paced technical and cybersecurity proactive and reactive environment. Threat Emulation and Attack Simulation Assist the design and deployment of offensive tools and techniques, including social engineering, security monitoring evasion, and custom tools for network exploitation. Ensure operations are conducted in a manner that mimics both known and emerging threats to test security readiness effectively. Regularly update attack techniques to emulate the latest cyber adversaries and align with real-world tactics, techniques, and procedures (TTPs). Develop and enforce guidelines and rules of engagement tailored to each operation, balancing realism with safety to avoid system disruptions.

Requirements

  • Must have a current Top-Secret Clearance with the capability of Obtaining SCI / CI-Poly if needed to meet contract requirements
  • Bachelors in Cybersecurity, Computer Science/Electrical Engineering, Engineering (or equivalent) with 1+ yrs of experience or a master's and 1+ years of experience.
  • 2+ years of experience in performing vulnerability assessments, network mapping, and service enumerations within a DOD Network Environment 
  • Experience conducting vulnerability assessments using industry tools - NESSUS, Nmap, Tenable, Kali, Burp Metasploit Core Impact, etc.

Responsibilities

  • Assist the design and deployment of offensive tools and techniques, including social engineering, security monitoring evasion, and custom tools for network exploitation.
  • Ensure operations are conducted in a manner that mimics both known and emerging threats to test security readiness effectively.
  • Regularly update attack techniques to emulate the latest cyber adversaries and align with real-world tactics, techniques, and procedures (TTPs).
  • Develop and enforce guidelines and rules of engagement tailored to each operation, balancing realism with safety to avoid system disruptions.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service