Join SAIC's cyber security team and work on this effort that encompasses technical, engineering, management, operation, logistical and administrative support for cyber security operations. The ideal candidate will have broad and deep experience in cyber security with demonstrated successes in supporting a large scale IT infrastructure encompassing overseas and domestic facilities.
The Branch serves to provide Tier 3 network monitoring/intrusion detection capability in support of the CIRT and agency investigations. It develops customized IDS signatures for use in network monitoring and intrusion detection, based on internally detected threats as well as those provided by partners in the Intelligence Community. The branch also performs advanced technical analyses, such as analysis of malicious code, network traffic, and Web log data, and deep-level review of hard drives and other storage media.
Lead a team that analyzes computer, communication, and network security events and exploits to determine security vulnerabilities and recommend remedial actions. Leads in forensic, malicious code, and packet-level analyses; provides comprehensive technical reports stepping through complete reverse engineering of incidents, recommending countermeasures based on original findings. Contributes technical security expertise in security working groups at the Department and National level. Maintains active relationships with counterparts in the Law Enforcement, Intelligence, and Computer Network Defense communities. Leads and supervises lower-level analysts.
Education: A Bachelor's Degree in Computer Science, Information Systems, Engineering, Telecommunications, or other related scientific or technical discipline is desired. Four (4) additional years of general experience (as defined below) may be substituted for the degree.
General Experience: Seven (7) years of experience in advanced network operations with increasing responsibilities.
Specialized Experience: Five (5) years of experience in network security with a focus on computer forensics, static code reverse engineering, and advanced (packet) network analysis. Static code reverse engineering experience can be substituted by experience in similar skill in computer forensics, network analysis, mobile device forensics related to malicious code, network flow analysis, or other similar skill.
Three (3) years of technical task management and supervisory experience.
Certification Required: Global Information Assurance Certification (GIAC) Reverse Engineering Malware (GREM) or similar reverse engineering certification. Three (3) years of reverse engineering experience may be substituted for the GREM certification.
Certification Desired: GIAC Security Essentials Certification (GSEC), GIAC Certified Incident Handler (GCIH), and GIAC Certified Forensics Analyst (GCFA), Cisco Certified Network Associate (CCNA), Certified Ethical Hacker (CEH), Microsoft Certified IT Professional (MCITP), Encase Certified Examiner (ENCE)
Ability to Travel: The branch routinely responds to ad-hoc tasking to include being part of special joint "fly-away" teams to support on-site inspections and investigations at overseas posts.
Must be a Those authorized to work in the United States without sponsorship are encouraged to apply. with an active Secret clearance
My SAIC Benefits.