Network Evaluator II
Apply NowCompany: Black Eagle Defense
Location: San Antonio, TX 78228
Description:
SALARY RANGE $115,000 - $125,000/year
DUTIES As a successful candidate for the Network Evaluator II position, you will evaluate operational or developmental networks and systems of U.S. government and military customers for weaknesses and susceptibility to a network attack, advise customers on countermeasures including the configuration of commercial products or hardware or software additions, produce evaluation reports and brief customers on results.
Required Skills:
QUALIFICATIONS A Bachelor's degree plus 5 years of relevant experience, or a Master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
Degree must be in Network Engineering, Systems Engineering, Information Technology, or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant experience must be working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic software utilities (e.g., SNORT and trace-route).
CERTIFICATIONS & TECHNICAL PROFICIENCIES Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified Ethical Hacker (CEH), and Certified Information Systems Auditor (CISA) certifications are preferred.
DUTIES As a successful candidate for the Network Evaluator II position, you will evaluate operational or developmental networks and systems of U.S. government and military customers for weaknesses and susceptibility to a network attack, advise customers on countermeasures including the configuration of commercial products or hardware or software additions, produce evaluation reports and brief customers on results.
Required Skills:
QUALIFICATIONS A Bachelor's degree plus 5 years of relevant experience, or a Master's degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate's degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
Degree must be in Network Engineering, Systems Engineering, Information Technology, or a related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant experience must be working in a security domain (e.g., cyber security, network security, information systems security, information assurance, and computer security), programming, systems architecture, vulnerability analysis, reverse engineering, malware analysis, protocol analysis, network analysis, software analysis, debugging, and/or using network security intrusion or computer network diagnostic software utilities (e.g., SNORT and trace-route).
CERTIFICATIONS & TECHNICAL PROFICIENCIES Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified Ethical Hacker (CEH), and Certified Information Systems Auditor (CISA) certifications are preferred.