CPVA - Infrastructure - Boundary with Security Clearance Law Enforcement & Security - San Antonio, TX at Geebo

CPVA - Infrastructure - Boundary with Security Clearance

Software Engineering Services is hiring for an exciting career in Cyber Protection as an Infrastructure/Boundary Assessor in San Antonio, TX.
Please review the qualifications and lets start your new career! The candidate will be responsible for conducting vulnerability and compliance inspections to include, but not limited to scanning network(s) to identify active client, server and infrastructure devices such as routers, switches, firewalls, proxy servers, intrusion detection/prevention systems (IDS/IPS), fingerprint applications/operating systems, identify vulnerabilities, analyze results, manually verify findings to eliminate false positives or negatives, capture artifacts such as screen captures, etc.
, to provide evidence and artifacts for each exploitable vulnerability, etc.
Candidate must also be able to adequately tell the story of how vulnerability was exploited and what the overall impact would be to particular hosts or networks.
More specifically, the candidate will:
o Conduct vulnerability and compliance assessments on AF and DoD systems (i.
e.
, Microsoft Windows and UNIX based platforms) and infrastructure devices (i.
e.
, routers, switches, Voice over IP, etc.
)o Demonstrated ability to read raw network device configuration and be able to identify and describe why a particular setting is erroneous without the assistance of automated toolso Ability to map out a network and identify the location of discovered devices within the networko Ability to methodically analyze problems and identify potential solutionso Ability to adequately explain, present, demonstrate when applicable and document the operational impact of a particular vulnerability or exploito Analyze and evaluate network and infrastructure diagrams for potential attack vectors; render sound cyber security remediation recommendations for items identifiedo Knowledgeable in common cyber threat terminology, methodologies, possess basic understanding of cyber incident and response, and related current events o Assist customer with implementing policies and tactics, techniques and procedures for conducting assessments o Exhibit good written and verbal skills, with an attention to detail and desire to deliver a quality product; additionally, an ability to render concise reports, summaries, and formal oral presentationso Travel up to 25% with trips encompassing 1-4 weeks in duration MINIMUM REQUIREMENTSo Must meet DoD 8570 IAT Level 3 requirements (CASP, CISSP+, CISA, etc.
) and have an active TS/SCI clearanceo Must possess a CSSP-Auditor (C EH, CySA, CISA, GSNA) certification within 6 months of hire o Must obtain MCSA, UNIX/Linux and CCNA certifications within 6 months of hireo Minimum Bachelor's degree and 2 years' experience, Associates degree with 4 years' experience or 6 years equivalent experience without a degree; degrees focused on engineering or applied science o System administrator experience (Windows, UNIX) (5 years)o Experience in working with and in a network systems security environment with a focus on network administration and security (5 years)o Must complete customer pre-screen, skills assessment lab, pass customer training and certification program and remain mission ready qualified o Self-motivated with minimal supervision PREFERRED REQUIREMENTS IN ADDITION TO THE AFOREMENTIONEDo Analytical with the ability to understand and implement customer objectives o Familiarity with NIST, RMF, DISA STIGs and experience in conducting DoD vulnerability and compliance assessmentso Experience or familiarity with military operations highly desirable Recommended Skills Applied Science Assessments Attention To Detail Auditing Certified Information Security Manager Cisco Certified Network Associate Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.