Sr. Cyber Security Engineer Internet & Ecommerce - Columbia, MD at Geebo

Sr. Cyber Security Engineer

Company Name:
ClearedPath
Our client, an engineering construction, technical and management services firm is seeking for a Sr. Cyber Security Engineer.
This is a direct placement located in Columbia, MD
To be qualified, candidates are required to have significant development experience / knowledge (A Computer Science degree and at least a year of mostly development work would be a good starting point). Languages matter less, although python and/or php experience would be useful. Or Windows and C/C+
development would be useful.
They also need to meet the CNE2 labor category.
7
years in 2 of the following:
a) computer network exploitation
b) Vulnerability Assessment
c) Penetration Testing
d) Incident Response
e) Network and/or server forensics
1
years in 2 of the following:
a) File Hashing and Fuzzy File Hashing (e.g. ssdeep, fciv, and md5deep)
b) Commercial, open source, or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
c) Packet capture/evaluation (e.g. tcpdump, ethereal/wireshark, NOSEHAIR)
d) Network mapping/discovery (e.g. nmap, TRICKLER)
e) Industry standard system/network tools (e.g. netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
2
years in 1 of the following:
a) Development of exploits for Microsoft Windows operation systems
b) Development of exploits for UNIZ operating systems
c) Development of exploits for personal computer device/mobile device operating systems (e.g. Andriod, Blackberry, IPhone, and IPad)
d) Software Reverse Engineering to include use of code disassemblers (e.g. IDA Pro) and debugging unknown code (e.g. Ollydbg)
e) Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernal dumps
f) Implementing network with IPv6 protocols
Candidates must have a TS/SCI with POLY.
US Citizenship is a requirement.
To be qualified, candidates are required to have significant development experience / knowledge (A Computer Science degree and at least a year of mostly development work would be a good starting point). Languages matter less, although python and/or php experience would be useful. Or Windows and C/C+
development would be useful.
They also need to meet the CNE2 labor category.
7
years in 2 of the following:
a) computer network exploitation
b) Vulnerability Assessment
c) Penetration Testing
d) Incident Response
e) Network and/or server forensics
1
years in 2 of the following:
a) File Hashing and Fuzzy File Hashing (e.g. ssdeep, fciv, and md5deep)
b) Commercial, open source, or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
c) Packet capture/evaluation (e.g. tcpdump, ethereal/wireshark, NOSEHAIR)
d) Network mapping/discovery (e.g. nmap, TRICKLER)
e) Industry standard system/network tools (e.g. netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
2
years in 1 of the following:
a) Development of exploits for Microsoft Windows operation systems
b) Development of exploits for UNIZ operating systems
c) Development of exploits for personal computer device/mobile device operating systems (e.g. Andriod, Blackberry, IPhone, and IPad)
d) Software Reverse Engineering to include use of code disassemblers (e.g. IDA Pro) and debugging unknown code (e.g. Ollydbg)
e) Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernal dumps
f) Implementing network with IPv6 protocols
Candidates must have a TS/SCI with POLY.
US Citizenship is a requirement.Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.