Planet Works, Inc
System Vulnerability Analyst
The ideal candidate for this position must possess the following:
Active TS clearance with polygraph.
AMOD tools experience.
A bachelor’s degree plus five (5) years of relevant experience.
Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field.
Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree.
The ideal candidate for this position should possess the following skills:
Zero Trust Experience is required.
Identify vulnerabilities of and attacks to the design and operation of a system by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
Analyst should be comfortable with network analysis, network anomaly detection, IOC’s Mitre ATT@CK framework, and be able to analyze data to discover malicious or unauthorized activity collected from various sources.
#J-18808-Ljbffr
Active TS clearance with polygraph.
AMOD tools experience.
A bachelor’s degree plus five (5) years of relevant experience.
Degree in Computer Science, Computer Engineering, Electrical Engineering, Mathematics, or a related field.
Additional work experience or completion of JCAC (Joint Cyber Analysis Course) may be utilized to offset a lack of a degree.
The ideal candidate for this position should possess the following skills:
Zero Trust Experience is required.
Identify vulnerabilities of and attacks to the design and operation of a system by relating vulnerabilities and attacks to effects on operations and missions supported by those systems.
Compare and contrast various system attack techniques and develop operationally effective countermeasures.
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the systems or missions being studied.
Analyst should be comfortable with network analysis, network anomaly detection, IOC’s Mitre ATT@CK framework, and be able to analyze data to discover malicious or unauthorized activity collected from various sources.
#J-18808-Ljbffr