Cyber Network Operator-TS/SCI with FS Poly with Security Clearance

Apply Now

Company: Inferno Systems

Location: Chantilly, VA 20151

Description:

CYBER NETWORK OPERATOR: Expert Level
Location: Chantilly, VA US
Security Clearance Requirement: TS/SCI with Full Scope Polygraph
Clearance Status: Must be Current JOB DESCRIPTION:
Inferno Systems is looking for proactive and self-motivated individuals to work as a Cyber Network Operator on a highly technical team conducting remote cyber operations. You should have a minimum of 7 years of related experience, have a solid background in the Penetration Test / Attack Lifecycle and be able to pivot and exploit while avoiding detection in high-security networks. You will be responsible for all phases of network exploitation and will be able to successfully attack and persist in customer networks which include a diverse set of network hosts and devices. You should have the ability to build out end-to-end specialized penetration testing and exploitation platforms while working closely with internal and external partners. This job requires experience working in a highly technical environment, mentoring more junior penetration testers, assisting with team projects and being able to complete tasks under a short deadline. REQUIRED SKILLS:
Experience working with and exploiting Microsoft Windows operating systems, all versions (Server / Desktop) within the last 5 years. Experience with Linux operating systems, including CentOS, Debian, RHEL, Ubuntu and others, with and without SELinux.
Possess system administration level knowledge of operating systems (i.e.: Windows, Unix, Linux, Mac OS, Mobile OSs, etc.) Experience with UNIX (Solaris, HP-UX, etc.) operating systems
Experience with BSD-based operating systems, including MacOS
Hands-on experience with common scripting / programming languages to automate tasks and/or parse data such as C++, Bash, Perl, PowerShell and Perl
Familiarity with / understanding of database administration and application development, including Oracle, SQL Server, and/or MySQL.
Familiarity with wireless (WiFi/WiMax/Bluetooth) technology (hardware or core software).
Familiarity with mobile phone operating systems (Android / iOS).
Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. Understanding / use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. Experience managing and installing network technologies such as routers, switches, database servers and related technologies. Understanding functionality and limits of available tools and techniques. Understanding of technical risk assessment. Understanding of various types of computer operations. Experience operating in a virtual environments such as VMware Workstation / ESXi / vSphere and/or KVM virtual machines
Understanding of network architecture, protocols and data flows.
Understanding the basic Internet functionality, ISPs, and network traffic. Understanding the basic authorities governing computer operations. Ability to convey information in a clear and concise manner, both verbally and in writing. Understanding of fundamental technical network analysis. Understanding of current US laws and regulations governing the Internet. Motivated self-starter with an analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security.
Understanding of Exploit methodology, processes and development.
Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS:
Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to approved operational plans. Experience working with orchestration tools such as Packer / Vagrant, Ansible, Puppet, Salt and/or Terraform or similar
C / C++ or Java software development.
Proficient with installation, management, and have development knowledge of technologies such as Apache or ISS web servers, web development (Perl, Java, XML/XSL). Leverage previous military or IC computer network exploitation training to analyze attacks against networks and develop countermeasures. Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
General technical certifications such as CompTIA Network+, Security+, Linux+

Similar Jobs