Target Analyst Reporter

Gormat

Annapolis Junction, MD

JOB DETAILS
SKILLS
Analysis Skills, Android, Apple iPad, Apple iPhone, Blackberry, Computer Networks, Computer Security, Cryptography, Debugging Skills, Disassemblers, Forensic Science, Government Off-the Shelf (GOTS), IDA Pro, IPv6, Incident Response, Industry Standards, Intelligence Agencies, Intelligence Community, Intrusion Detection Systems, Journalism, Kernel Programming, MD5 (Message Digest Algorithm 5), Memory Hardware, Microsoft Windows Operating System, Military Intelligence, Mobile Devices, Mobile Operating System, NMap, OllyDbg, Open Source, PC (Personal Computer) Systems, Penetration Testing, Reverse Engineering, Snort, Software Engineering, Unix Operating Systems, Wireshark (Ethereal), tcpdump
LOCATION
Annapolis Junction, MD
POSTED
19 days ago

We are currently seeking a Target Analyst Reporter (TAR) to join our team and support critical national security missions in the Fort Meade area. Candidate must be fully cleared. 

Qualifications

  • At least seven (7) years experience in two (2) or more of the following (see "LCAT Substitutes" Education for substitutes to this requirement for a total of four [4] years only):
  • Computer Network Exploitation
  • Vulnerability Assessment
  • Penetration Testing
  • Incident Response
  • Network and/or server forensics
  • Cryptoanalytic work in military or intelligence community organization
  • Cryptology in military or intelligence community organization
  • At least one (1) year of experience in two (2) or more of the following:
  • File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep)
  • Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
  • Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
  • Network mapping/discovery (e.g.,nmap, TRICKLER)
  • Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
  • At least two (2) years of experience in one (1) or more of the following:
  • Development of exploits for Microsoft Windows operating systems
  • Development of exploits for UNIX operating systems
  • Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
  • Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g. Ollydbg)
  • Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
  • Implementing networks with IPv6 protocols

TS/SCI with polygraph is required.



Job Posted by ApplicantPro

About the Company

G

Gormat