Description

JD:
Duties & Responsibilities:
Consults on IT and cyber defensive architecture and technologies.
Assesses assigned Cyber domain to thoroughly understand the mission, architecture and threat.
Advises on technical design and implementation of Defensive Cyber Operations capability required to effectively protect, detect and respond to cyber threats and attack.
Research cyber defense technology options for best fit based on mission, architecture and threat.
Design, implement, configure and/or tune Cyber Defense technology.
Authors documentations to include SOPs, checklists, implementation guides, architecture diagrams, crew binders, etc.
Adapt technologies to meet best fit for the mission architecture and threat. Technologies include SIEM, vulnerability assessment, discovery, infrastructure (firewall, IPS/IDS, proxy, network capture), host based security, PCAP, penetration testing/external assessment tools, forensics, etc.
Develop and tune cyber tools and technology like ELK, Kafka, Suricata, BRO, cuckoo, yara, etc.

REQUIREMENTS 
Must be able to work within the U.S. Government, Defense Sector
BS degree in a cyber-related discipline (e.g. network engineering, computer science, information systems, software engineer, programming, etc.).
One of the following certifications: CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH,CCSP
5 years of technical experience in cyber-defense or cyber security related fields (e.g., engineering, networking, systems integration, solutions etc.)
5 years of professional technical experience. Experience years must come from at least 2 of the following areas:
- Container or virtual environments (e.g. Docker, Kubernetes, VMware, AWS)
- In-band and out-of-band test access points for network traffic collection and aggregation (e.g. Gigamon)
- Data storage solutions (e.g. NFS storage, distributed storage, Ceph Ruck storage, etc.)
- Data-analysis toolsets (e.g. Elastic Search, Logstash, Kibana, Splunk, etc.)
- Agile frameworks for software development
- Linux operating systems (Red Hat, Kali, etc.)
- Windows operating systems
- Network infrastructure
- Security applications (Security Orchestration, Automation, and Response [SOAR], Security Information and Events Management [SIEM], Intrusion Detection Systems [IDS], etc.)

Education

ANY GRADUATE