System Vulnerability Analyst 3
Annapolis Junction, MD, USA
Full Time Entry-level / Junior Clearance required USD 126K - 141K
Job Description:
We are looking for a System Vulnerability Analyst to identify vulnerabilities of and attacks to the design and operation of a system (H/W, S/W, personnel, procedures, logistics, and physical security) by relating vulnerabilities and attacks to effects on operations and missions supported by those systems. You will compare and contrast various system attack techniques and develop operationally effective countermeasures. You will also produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
The Level 3 SVA shall possess the following capabilities:
- Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience.
-
Analyst should be comfortable with network analysis, network anomaly detection, IOC's, Mitre Att&ck framework, AMOD tools experience, and be able to analyze data to discover malicious or unauthorized activity collected from various sources.
Qualifications:
- Doctoral degree with 2 years of relevant experience
- Master's degree with 3 years of relevant experience
- Bachelor's Degree with 5 years of relevant experience
- Associates degree with 7 years of relevant experience
- Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security
- Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
- Zero Trust Experience is required
- Analyst should be comfortable with network analysis, network anomaly detection, IOC's, Mitre Att&ck framework, AMOD tools experience, and be able to analyze data to discover malicious or unauthorized activity collected from various sources.
Must Have an ACTIVE TS/SCI With Full Scope Poly.
Tags: Computer Science Cyber defense Forensics Mathematics MITRE ATT&CK Network security Pentesting TS/SCI Vulnerabilities Zero Trust
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.