Please scroll down, To apply

Cyber Network Operator with Security Clearance

hiring now

Inferno Systems

2024-11-06 18:42:49

Job location Chantilly, Virginia, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

CYBER NETWORK OPERATOR: Expert Level
Location: Chantilly, VA US
Security Clearance Requirement: TS/SCI with Full Scope Polygraph
Clearance Status: Must be Current JOB DESCRIPTION:
Inferno Systems is looking for proactive and self-motivated individuals to work as a Cyber Network Operator on a highly technical team conducting remote cyber operations. You should have a minimum of 7 years of related experience, have a solid background in the Penetration Test / Attack Lifecycle and be able to pivot and exploit while avoiding detection in high-security networks. You will be responsible for all phases of network exploitation and will be able to successfully attack and persist in customer networks which include a diverse set of network hosts and devices. You should have the ability to build out end-to-end specialized penetration testing and exploitation platforms while working closely with internal and external partners. This job requires experience working in a highly technical environment, mentoring more junior penetration testers, assisting with team projects and being able to complete tasks under a short deadline. REQUIRED SKILLS:
• Experience working with and exploiting Microsoft Windows operating systems, all versions (Server / Desktop) within the last 5 years. • Experience with Linux operating systems, including CentOS, Debian, RHEL, Ubuntu and others, with and without SELinux.
• Possess system administration level knowledge of operating systems (i.e.: Windows, Unix, Linux, Mac OS, Mobile OS's, etc.) • Experience with UNIX (Solaris, HP-UX, etc.) operating systems
• Experience with BSD-based operating systems, including MacOS
• Hands-on experience with common scripting / programming languages to automate tasks and/or parse data such as C++, Bash, Perl, PowerShell and Perl
• Familiarity with / understanding of database administration and application development, including Oracle, SQL Server, and/or MySQL.
• Familiarity with wireless (WiFi/WiMax/Bluetooth) technology (hardware or core software).
• Familiarity with mobile phone operating systems (Android / iOS).
• Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding / use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. • Experience managing and installing network technologies such as routers, switches, database servers and related technologies. • Understanding functionality and limits of available tools and techniques. • Understanding of technical risk assessment. • Understanding of various types of computer operations. • Experience operating in a virtual environments such as VMware Workstation / ESXi / vSphere and/or KVM virtual machines
• Understanding of network architecture, protocols and data flows.
• Understanding the basic Internet functionality, ISPs, and network traffic. • Understanding the basic authorities governing computer operations. • Ability to convey information in a clear and concise manner, both verbally and in writing. • Understanding of fundamental technical network analysis. • Understanding of current US laws and regulations governing the Internet. • Motivated self-starter with an analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security.
• Understanding of Exploit methodology, processes and development.
• Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS:
• Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to approved operational plans. • Experience working with orchestration tools such as Packer / Vagrant, Ansible, Puppet, Salt and/or Terraform or similar
• C / C++ or Java software development.
• Proficient with installation, management, and have development knowledge of technologies such as Apache or ISS web servers, web development (Perl, Java, XML/XSL). • Leverage previous military or IC computer network exploitation training to analyze attacks against networks and develop countermeasures. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
• General technical certifications such as CompTIA Network+, Security+, Linux+

Inform a friend!

<!– job description page –>
Top