Current Openings

Manager Security Programs

Experience:

Fifteen (15) years of experience supporting DoD, Intelligence Community, or other US government agencies’ IT systems, with six (6) or more years of relevant experience providing general management of contractual effort, management of engineering, training, analytical service, systems administration, and other functional areas in support of IT Security tasks. Duties include managing and leading teams supporting the security requirements of DoD, Intelligence Community, and other US government agencies IT networks. Responsible for assessing and ensuring program health and subordinate team leads’ performance. Directs all phases of programs from inception through completion. Drives program cost, schedule, and technical performance.

Education:

Master’s degree in Computer Science or Engineering. Requires PMP certification and one (1) of the following: CISSP, Global Information Assurance Certification (GIAC), ISSAP or equivalent certification; others may be required depending upon customer’s unique needs. ITIL V3 experience is desirable.

Senior IA Security Specialist – SME

Experience:

Twelve (12) years of experience supporting DoD, Intelligence Community, or other US government agencies’ IT systems with at least eight (8) years of technical experience in the IA Security field with four (4) of those in a management role. Provides technical, managerial, and administrative direction for problem definition, analysis, requirements development, and implementation for complex to extremely complex systems in the subject matter area. Makes recommendations and advises on organization-wide system improvements, optimization or maintenance efforts in the following specialties: information systems architecture, networking, automation, communications protocols, and risk management/analysis.

Education:

Bachelor’s degree in Computer Science or Engineering. Requires PMP certification and one (1) or more of the following: CISSP, ISSAP, or equivalent; others may be required depending upon customer’s unique needs. ITIL V3 experience is desirable.

Information Assurance Security Forensics Specialist – SME

Experience:

Seven (7) years of IT experience supporting DoD, Intelligence Community, or other US government agencies’ IT systems with five (5) years of expert-level acquisition, marking, handing, and storage of evidence procedures. Ability to follow chain-of-custody procedures and understand rules of evidence as they relate to computer examination. Must have a basic knowledge of hardware construction and theory and be knowledgeable in network protocols. Proficient at authenticating documents and accessing and interpreting metadata. Able to develop and document collection and analysis procedures of evidence recovered from a system under investigation. Must know and understand Best Business Practices on how to investigate and recover deleted data. Has expert knowledge of hacker tactics, techniques, and procedures (TTP) and ability to research vulnerabilities and analyze exploits. Able to perform imaging and forensic analysis with hands-on experience with EnCase/FTK Data Recovery Software Tools.

Education:

Bachelor’s degree in Computer Science or related field. Must meet Defense Cyber Crime (DC3) certification requirements; others may be required depending upon customer’s unique needs.

Senior Certified Penetration Tester

Experience:

Ten (10) years of IT experience supporting DoD, Intelligence Community, or other US government agencies’ IT systems with five (5) years of experience conducting penetration testing by scanning networks for open ports and other security vulnerabilities present on the network. Evaluates and documents the results of poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures. Determines the feasibility of an attack through the process of carrying out a penetration test. Reports on status of security applications. Assists customer with advice on how to rectify issues – i.e. trigger antivirus/antispyware update, etc.

Education:

Bachelor’s degree in Computer Science or related field. Requires one (1) or more of the following professional certifications: CISSP, CPP, or GIAC; others may be required depending upon customer’s unique needs.

Network Security Engineer

Experience:

Five (5) years of experience in IT; four (4) years serving as a Network Security Engineer in support of DoD, Intelligence Community, or other US government agencies’ IT systems. Responsible for design and specification of network security hardware and software, enforcing the network security policy, and complying with requirements of external security audits and recommendations. Other responsibilities include performing analysis of network security needs; analyzing, troubleshooting, and correcting network problems remotely and on-site; and continuous evaluation of perimeter security systems such as firewalls and intrusion detection systems.

Education:

Bachelor’s degree in Computer Science or Engineering. Requires CCNA certification; others may be required depending upon customer’s unique needs.

Vulnerability Assessment Analyst

Experience:

Five (5) years of experience supporting DoD, Intelligence Community, or other US government agencies’ IT systems working on complex IA projects involving all phases of vulnerability assessments and network operations. Assesses, addresses, correlates, analyzes, IA threats and provides course-of-action decisions to support mitigation. Develops high quality assessments that provide an understanding and resolution to security related events as they occur. Develops and documents vulnerabilities including solutions/countermeasures and exploits for the purpose of identifying signatures. Able to address problem area and recommend automated solutions. Assesses impact, determines probable damage and suggests methods of damage control; conducts computer forensics, and follow-on analysis to build historical and predictive capabilities. Analyzes and recommends resolution of vulnerabilities based on knowledge of the major hardware and software products and services and understanding of their limitations. Applies knowledge of current IA policy, tactics, techniques, policy, and doctrine, and relationship to IA reporting requirements and structure.

Education:

Bachelor’s degree in Computer Science or related field. Requires one (1) or more of the following certifications: CISSP, CISM and/or other security certifications; others may be required depending upon customer’s unique