Cyber Security Forensics Engineer IV

Security, Engineer, Engineering, Analyst, Network, IT, RF, Test, Research, Computer, TCP, IP, Wireless, Windows, Systems, System, Programming, Java, Perl, Python, Linux, Interface, MCSE
Full Time
Work from home not available Travel not required

Job Description

Business Group Highlights
Intelligence
The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.

Responsibilities
Work Description:The Cyber Security Forensic Analyst (CSFA) will support the Sponsor in executing elements of multi-faceted programs to support dynamic mission set s. This includes using project concepts and principles to complete tasks as directed by the Sponsor. The CSFA will coordinate and complete activities for all source Cl risk assessments of communications technologies and the overall Sponsor's objectives in a timely manner. This position requires some local travel, as required.
The Customer is seeking Cyber Security Forensic Analysts/Senior Level with Network Engineering Cl-centric experience and skills. The analyst will support the customer's overall counterintelligence threat analysis efforts by performing technical assessments on IT infrastructure components, malicious code, and Advance Persistent Threat capabilities as they relate to computer networking. The position's candidate will be expected to conduct Cl assessments which identify and analyze all or part of a component's existing or new peripheral, network, and telecommunications systems requirements, taking into consideration special technology needs. The position candidate is expected to perform vulnerability assessment and penetration testing of internal, perimeter, external and wireless network devices and web applications. Duties include, but are not restricted to:

  • Conduct computer systems analysis, RF, and security vulnerability support services that include, but are not limited to the following areas: RF systems consultation; wireless RF communications systems;

  • RF spectrum management; RF interference monitoring; electromagnetic compatibility; waveform and signals processing; LTE and other wireless technologies (e.g., Internet of Things)

  • Assess new and evolving secure comms applications/devices for Counterintelligence (Cl) risks that are realized when such products are utilized in support of

  • Establish functional and technical specifications and standards, solve hardware and software interface problems, define input/output parameters, and ensure integration of the entire systems or subsystem.

  • Work with other engineers, systems analysts, programmers, technicians, scientists and top-level managers in the design, testing and evaluation of systems.

  • Establish and maintain baseline functional and technical specifications/standards for each (system) deployed.

  • Track and research hardware and software problems and/or anomalies reported or identified by audit activities.

  • Coordinates with other team members and ensures problem solution, appropriate risk reduction, and resolution activities.

  • Test and evaluate hardware and software to determine efficiency, reliability, and compatibility with existing system, and make purchase recommendations.

  • Estimate software/hardware acquisition, testing, and delivery requirements to include a tentative cost and schedule for each.

  • Assist with network performance monitoring activities to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.

  • Research new technology and implement it or recommend its implementation.

  • Test and evaluate hardware and software to determine efficiency, reliability, and compatibility with existing system, and make purchase recommendations.

  • Plan, coordinate, and implement network security measures to protect data, software, and hardware. Recommend changes to improve systems and network configurations, and determine hardware or software requirements related to such changes.

  • Confer with stakeholder about how to solve existing system problems.

  • Monitor network performance to determine whether adjustments need to be made, and to determine where changes will need to be made in the future.

  • Gather data pertaining to customer needs, and use the information to identify, predict, interpret, and evaluate system and network requirements.


As a Cyber Security Forensic Specialist, personnel may often times find him/herself attending meeting at various other sites. Personnel will be sitting Chantilly. Personnel will travel may travel between Chantilly, McLean, and another site as necessary for performance of duties. All personnel coming into the Department undergo an additional security review.

Qualifications

Required skills:


  • TS/SCI with poly clearance required

  • Bachelor's degree in Engineering, or Computer/Physical Science with a minimum 5 years work experience in the field. Equivalent work experience in a technical field will be considered.

  • Desire, expertise, and skills to provide technical support in one or more of a wide range of RF technologies to include; terrestrial and space-based RF communications, government and commercial satellite systems, commercial cellular and wireless, and embedded software/firmware development.

  • Working knowledge of the security and Cl concerns related to data management

  • Familiarity with computer security, authentication and cryptography

  • Familiarity with the use of secure comms systems, how they are utilized to support operations to include an understanding of the counterintelligence risks which need to be mitigated

  • Experience assessing technologies and software to identify and determine the security and counterintelligence issues/concerns.

  • Exposure to computer network defense operations (proxy, firewall, IDS/IPS)

  • Understanding of network communications using TCP/IP protocols, DNS, and DHCP

  • Experience working with WiFi access points to include 802.ll a/ b/ g/ n Wireless technologies

  • Understanding/familiarity with any of the standard commercial forensic tools including FTK, Paraben, Helix, Ilook, Xways, WireShark, FireEye

  • Experience working with Windows based plat forms.

  • Computer software/hardware, associated peripherals, and telecommunications networks - Knowledge and familiarity with computer hardware and software, especially network security/monitoring applications and configuration.

  • Critical Thinking - Using logic and reasoning to identify the strengths and weaknesses of alternative solutions, conclusions or approaches to problems.

  • Complex Problem Solving - Identifying complex problems and reviewing related information to develop and evaluate options and implement solutions.

  • Systems Evaluation - Identifying measures or indicators of system performance and the actions needed to improve or correct performance, relative to the goals of the system.

  • Coordination - Ability to adjust/coordinate work activities based on changing priorities in relation to others' actions.

  • Oral Comprehension - The ability to listen to and understand information and ideas presented through spoken words and sentences.

  • Written Comprehension - The ability to read and understand information and ideas presented in writing.

  • Deductive Reasoning - The ability to apply general rules to specific problems to produce answers that make sense.


Desired skills:

  • Experience with the Macintosh Operating System

  • Experience in mobile IT technologies

  • Programming experience with Java, C, C++, Perl, Python or Enscripts

  • Experience with Linux/Unix

  • Experience with any of the standard commercial forensic tools including FTK, Para ben, Helix, llook, Xways, WireShark, FireEye

  • Familiarity with computer networks and associated technologies

  • Interface with vendors and third-party producers

  • One of more of the following Certifications:

    • Microsoft Certified Systems Engineer (MCSE)

    • Microsoft Certified IT Professional (MCITP)




About Perspecta
What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector-from investigative services and IT strategy to systems work and next-generation engineering.
Our promise is simple: never stop solving our nation's most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.
Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.

Options
Apply for this job onlineApply
Share
Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed
As a government contractor, Perspecta abides by the following provision
PAY TRANSPARENCY NONDISCRIMINATION PROVISION
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)
Dice Id : 10166753
Position Id : 7173_87780
Originally Posted : 3 months ago
Have a Job? Post it

Similar Positions

Lead Cybersecurity Engineer at Children's National
  • Cerner Corporation
  • Silver Spring, MD
Cyber Security Forensic Specialist (Polygraph Required)
  • General Dynamics Information Technology
  • Herndon, VA
Senior Cyber Security Malware Analyst
  • NetCentrics Corp
  • Alexandria, VA
Lead Cyber Security Engineer (SIEM)
  • Phoenix Staff, Inc.
  • Ashburn, VA
Senior Cybersecurity Engineer
  • The Aspen Institute
  • Washington, DC
Cyber Security Engineer
  • GATE Staffing
  • Washington D.c., DC
Cyber Security Tools Specialist
  • Zolon Tech Solutions Inc
  • Springfield, VA
Cyber Security Engineer
  • Eliassen Group
  • Rockville, MD