Cvpa Infrastructure Specialist with Security Clearance - San Antonio, TX, United States - ANALYGENCE, Inc.

    ANALYGENCE, Inc.
    ANALYGENCE, Inc. San Antonio, TX, United States

    2 weeks ago

    ANALYGENCE, Inc. background
    Technology / Internet
    Description
    Job Description The Air Combat Command's 67th Cyberspace Wing (67 CW), 346th Test Squadron (346TS) plans, executes, and contributes as both an operational and participating test organization in a full array of operational tests of various cyber weapons in coordination with the 318 Range Squadron (318RANS) who provides instrumented cyber range services, through both physical hardware and virtual systems
    In support of this mission, ANALYGENCE is seeking a Cooperative Vulnerability and Penetration Assessment (CVPA) Infrastructure Specialist to conduct assessments of threats and vulnerabilities; determine deviations from acceptable configurations, enterprise, or local policy; assess the level of risk; develop or recommend appropriate mitigation countermeasures in operational and nonoperational situations; perform assessments of systems and networks within the network environment; and, measure effectiveness of defense-in-depth architecture against known vulnerabilities

    Specifically, the CVPA Infrastructure Specialist shall:

    • Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
    • Analyze software applications to gain an understanding of the system, mission and or application vulnerabilities and exploits.
    • Develop exploits for exposed vulnerabilities with a focus on non-interference of mission partner systems and networks.
    • Provide system defense support for Windows Operating System, identify, and mitigate UNIX based operational system vulnerabilities.
    • Implement Computer Network Defense (CND) infrastructure support, identify and mitigate infrastructure vulnerabilities and persistent threats, understand, detect and emulate network infrastructure adversary tactics, techniques and procedures.
    • Reverse engineering, analyze software applications to gain understanding of system, mission and or application vulnerabilities.
    • Conduct Web and Database Vulnerability Analysis, identifying application-based vulnerabilities with a focus on computer security, system administration capabilities and detection of abuse or misuse.
    • Conduct and/or support authorized penetration testing on enterprise network assets.
    • Develop products and implement network protocols in an operational environment, research networks and application technologies.
    • Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
    • Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
    • Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions
    Requirements


    • Current Top Secret clearance with SCI eligibility.
    • Bachelor's degree in a related field and a minimum of 3 years of experience in a CVPA Infrastructure or equivalent environment.
    • IAT III in one or more of the following: Penetration Testing, Ethical Hacking, *NIX OS, Windows OS, Web, Vulnerabilities, Databases, Networking, Wireless, Security Tools
    • Experience with computer networking concepts and protocols, and network security methodologies.
    • Experience testing Windows Operating Systems, UNIX and other systems.
    • Experience with Evaluated Level of Assurance (ELA), Innovative testing, and Industrial Control Systems (ICS) protocols
    • Understanding risk management processes (e.g., methods for assessing and mitigating risk), laws, regulations, policies, and ethics as they relate to cybersecurity and privacy, cybersecurity and privacy principles, cyber threats and vulnerabilities, specific operational impacts of cybersecurity lapses and application vulnerabilities.
    • Knowledge of cryptography and cryptographic key management concepts, data backup and recover, host/network access control mechanisms (e.g., access control list, capabilities lists).
    • Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
    • Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML), how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
    • Knowledge of programming language structures and logic, system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
    • Knowledge of systems diagnostic tools and fault identification techniques and what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
    • Knowledge of interpreted and compiled computer languages, different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
    • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored), system administration, network, and operating system hardening techniques.
    • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
    • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth), security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model).
    • Knowledge of ethical hacking principles and techniques and data backup and restoration concepts, system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems and infrastructure supporting information technology (IT) for safety, performance, and reliability.
    • Knowledge of an organization's information classification program and procedures for information compromise, packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump).
    • Knowledge of cryptology, network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
    • Knowledge of penetration testing principles, tools, and techniques and an organization's threat environment.
    • Knowledge of Application Security Risks (e.g
    Open Web Application Security Project Top 10 list).


    • Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems and assessing the robustness of security systems and designs.
    • Detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort).
    • Experience in mimicking threat behaviors, the use of penetration testing tools and techniques and the use of social engineering techniques
    (e.g., phishing, baiting, tailgating, etc.).


    • Network analysis tools to identify vulnerabilities
    (e.g., fuzzing, nmap, etc.), reviewing logs to identify evidence of past intrusions and conducting application vulnerability assessments.


    • Perform impact/risk assessments and develop insights about the context of an organization's threat environment
    • Experience with cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation) and the ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
    • Programming language structures (e.g., source code review) and logic and the ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture.
    • Understanding cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
    • Summary Our people-first culture drives mission success
    ANALYGENCE provides leading-edge technology and result-focused solutions that address the infinite variables that affect our clients' goals in the cyberspace, intelligence, and mission support domains
    Born out of diverse backgrounds and forged through government, military and industry experience, our team members are the backbone of our solutions
    Our various perspectives advance capabilities and drive successful operations
    Through our purpose-driven team culture, the productivity and effectiveness of critical missions are amplified
    Our vision is to continue to build an environment that encourages our people to evolve by applying a foundation of core values to everything we do
    We focus on adding value to people so that they can bring value to others, and this culture drives our relentless pursuit of exceptional mission critical results
    ANALYGENCE is a Service-Disabled Veteran-Owned Small Business (SDVOSB) committed to hiring and retaining a diverse workforce

    We are proud to be an Equal Opportunity/Affirmative Action Employer, making decision without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class.