Logo
NetSage

Exploitation Analyst-Mid

NetSage, Baltimore, Maryland, United States

Save Job

Annapolis Junction, Maryland, United States NetSage's mission is to help our customers achieve their missions by providing superior cyber services. We seek talented professionals who are interested in doing meaningful, mission-focused work for the US Federal Government. We are a growing Company that puts our employees first and offers excellent pay and world-class benefits. We do not hire contract by contract; instead, we offer multiple job options and career progression for our employees. If you have questions about any of our job openings, please connect with us using our Contact Us page. Job Description

We are seeking Exploitation Analysts (EAs) to support our customer\'s missions. The analysts must possess the skills to analyze, map, protect, or discover vulnerabilities, intrusions, and threats in computer network systems. The ideal candidate will have the ability to protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks. The ability to identify and de-obfuscate data; analyze system alerts; and report on computer probe and network infiltration attempts on network infrastructure is required. Responsibilities

Analyze, map, protect, or discover vulnerabilities, intrusions, and threats in computer network systems. Protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks. Identify and de-obfuscate data; analyze system alerts; report on computer probe and network infiltration attempts on network infrastructure. Required Qualifications

TS/SCI with polygraph. An Associate of Science (A.S.); Bachelor of Science (B.S.); Master of Science (M.S.); or Doctorate (PhD) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). A.S. + 7 yrs.; B.S. + 5 yrs.; M.S. + 3 yrs.; PhD + 2 yrs. of experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. Experience collecting information from sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events, and defend against events that might occur. Ability to develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. Voluntary Self-Identification and Equal Employment Opportunity

We are an equal opportunity employer. Completion of voluntary self-identification surveys is encouraged and will be kept confidential. Information provided will be used for government reporting purposes and will not affect hiring decisions. For reference, the following categories describe protected veteran statuses and disability information commonly collected in voluntary reports. This information is requested to measure outreach and recruitment efforts under applicable laws. It is entirely voluntary to respond, and responses are confidential. Public burden statement: This information collection is carried out under standard government practices. This form should take only a few minutes to complete.

#J-18808-Ljbffr