Job Openings
Cyber Security Analyst
About the job Cyber Security Analyst
Primary Responsibilities:
- The Contractor shall provide support for designing, engineering, implementing, and maintaining enterprise quality systems, networks, and applications for Cyber related investigations across the Sponsors initiatives.
- The Contractor shall assist the Sponsor in the evaluation of software and associated documentation.
- The Contractor shall collaborate with customers to evaluate or diagnose problems and recommend possible solutions.
- The Contractor shall conduct historical analyses of test results.
- The Contractor shall conduct software compatibility tests with programs, hardware, operating systems, or network environments.
- The Contractor shall coordinate user or third party testing.
- The Contractor shall create or maintain databases of known test defects.
- The Contractor shall develop testing programs that address areas such as database impacts, software scenarios, regression testing, negative testing, error or bug retests, or usability.
- The Contractor shall design or develop automated testing tools.
- The Contractor shall design test plans, scenarios, scripts, or procedures.
- The Contractor shall document test procedures to ensure replicability and compliance with standards.
- The Contractor shall develop and define characteristics of quality including quality metrics and scoring parameters and determine requisite quality control resources.
- The Contractor shall develop or specify standards, methods, or procedures to determine product quality or release readiness.
- The Contractor shall document software defects, using a bug tracking system, and report defects to software developers.
- The Contractor shall evaluate or recommend software for testing or bug tracking.
- The Contractor shall identify program deviance from standards and suggest modifications to ensure compliance.
- The Contractor shall identify, analyze, and document problems with program function, output, online screen, or content.
- The Contractor shall install and configure recreations of software production environments to allow testing of software performance.
- The Contractor shall install, maintain, or use software testing programs.
- The Contractor shall monitor bug resolution efforts and track successes.
- The Contractor shall monitor program performance to ensure efficient and problem-free operations.
- The Contractor shall participate in formal and informal reviews to determine quality.
- The Contractor shall participate in product design reviews to provide input on functional requirements, product designs, schedules, or potential problems.
- The Contractor shall perform initial debugging procedures by reviewing configuration files, logs, or code pieces to determine breakdown source.
- The Contractor shall plan test schedules or strategies in accordance with project scope or delivery dates.
- The Contractor shall provide feedback and recommendations to developers on software usability and functionality.
- The Contractor shall provide technical support during software installation or configuration.
- The Contractor shall review software documentation to ensure technical accuracy, compliance, or completeness, or to mitigate risks.
- The Contractor shall test system modifications to prepare for implementation.
- The Contractor shall update automated test scripts.
- The Contractor shall utilize beta testing sites to evaluate software performance.
Requirements
Basic Qualifications:
- Candidate must have an active TS/SCI with a Full Scope Polygraph
- Requires Bachelors with 12-15 years of prior relevant experience or Masters with 10-13 years of prior relevant experience. Additional years of experience can be accepted in lieu of a degree.
- Demonstrated experience performing hands-on forensic review of devices to include laptops and mobile devices, using open source or commercial forensic tools, such as EnCase, FTK, X-Ways, Magnet IEF, or BlackLight.
- Demonstrated experience handling and imaging various types of evidence from Solid State Drives (SSD), Hard Disk Drives (HDD), Thumb Drives, Volatile Memory, or Compact Disks.
- Demonstrated experience with data extraction and analysis from various data sources including files, logs, directories, unallocated space, raw images, and custom databases.
- Demonstrated experience parsing data types necessary to extract metadata and content of forensic value from various data sources.
- Demonstrated experience and in depth understanding of multiple operating systems such as Windows, Linux, iOS, and Android.
- Demonstrated experience performing hands-on forensic review or reverse engineering of modern mobile devices such as Google Android or Apple iOS.
- Demonstrated experience working with virtualization software and virtualized environments to include ESXi, VMWare, or VirtualBox.
- Demonstrated experience conducting analysis of identified malicious software or code using both static and dynamic malware analysis.
- Demonstrated experience using debuggers and disassemblers such as OllyDbg, WinDbg, IDA Pro, or Binary Ninja.
- Demonstrated experience understanding system kernel level processing to detect and report on significant kernel events such as root kits, hooked functions, call tables, and data structures.
Desired Qualifications:
- Demonstrated experience using programming skills using scripting languages such as Perl, Python, or Bash.
- Demonstrated experience with Sponsors enterprise and operational activities, capabilities, technical development programs.
- Demonstrated experience with Sponsors information cyber security policies and regulations.
- Demonstrated experience with risk management standards, Committee on National Security Systems Publication (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, and National Institute of Standards and Technology (NIST) Special Publication 800-37, 800-39, 800-53.