Cyber Security Engineer with Security Clearance Engineering - Burke, VA at Geebo

Cyber Security Engineer with Security Clearance

Cyber Security Engineer, Principal Seeking a motivated, career and customer-oriented Cyber Security Engineer to join our team in Springfield, VA, to provide unparalleled support to our customer and to begin an exciting and rewarding career within ManTech. Responsibilities include, but are not limited to:
o Support Cyber Operations activities to publish up-to-date cybersecurity tool signatures (e.ganti-virus and host based security systems) o Provide focused analysis, including reverse malware engineering, against intrusion, anomalies, malware, viruses to identify critical information about source, intended target, affected systems or hosts, recommended mitigation measures and risk to mission o Formulate custom Security Information and Event Management (SIEM) tool content and IDS/IPS signatures to address threats o Performs security event and incident correlation using information gathered from a variety of sources within the enterprise o Analyzes and assesses damage to the data / infrastructure as a result of cyber incidents o Performs cyber incident trend analysis and reportingo Characterizes and performs analysis of network traffic and system data to identify anomalous activity and potential threats to resourceso Provides detection, identification, and reporting of possible cyber-attacks/intrusions, anomalous activities, and misuse activities o Create and deploy threat-based signatures for operational intrusion detection capabilitieso Create and implement detection rules from intelligence reporting Basic
Qualifications:
o Minimum Education:
B.Sor equivalent experience in related field o Minimum/General
Experience:
7 years of related experience o Experience with modern Windows, UNIX, network operating systems, databases, and virtual computing o DoD 8570 certification meeting IAT Level II ((GSEC, Security+, SSCP, or CCNA-Security)) requiredo CNDSP-A (GCIA, GCIH, or CEH) or CNDSP-IR (GCIH, CSIH, or CEH) certification requiredDemonstrated Technical
Experience:
o Experience performing analysis of network traffic and correlating diverse security logs to perform recommendations for signature development o Knowledge with implementation of counter-measures or mitigating controlso Ability to support incident response and forensic operations as required to include static/dynamic malware analysis and reverse engineeringo Experience with enterprise security tools, including Security information and event management (SIEM), Threat intelligence platforms (TIPs), or Network monitoring tools o Experience in creating, modifying, tuning, IDS signatures/SIEM correlation searches and other detection signaturesPreferred
Qualifications:
Proficient in Linux operating systemsAdvanced skills in Linux/Unix (command line user - proficient and used in last 6 months)Working knowledge of current COTS Cybersecurity technologiesSecurity Clearance Requirements:
o TS/SCI w/Poly Physical Requirements:
o Must be able to remain in a stationary position 50% o Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer o The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentationsMust be able to exchange accurate information in these situations Recommended Skills Certified Ethical Hacker Cisco Certified Network Associate Command Line Interfaces Computer Networks Computer Security Databases Apply to this job. Think you're the perfect candidate? Apply on company site $(document).ready( function() $(#ads-desktop-placeholder).html(
n
n
n Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.