Job Description
Role: Cyber Security
Location: Remote
Duration: Longterm
Job Details
Candidates must have TS SCI with full scope poly
Required skills and demonstrated experience
- Demonstrated experience in cyber security or related IT field.
- Demonstrated experience with adversarial tactics, techniques, & procedures (TTPs).
- Demonstrated experience with computer attack methods and system exploitation techniques.
- Demonstrated experience with cyber security principles for Linux, Windows, virtual platforms, networking, and Cloud.
- Demonstrated experience with network architectures and fundamentals.
- Demonstrated experience developing risk management methodologies.
- Demonstrated experience analyzing test results to develop risk and threat mitigation plans.
- Demonstrated experience with market-leading vulnerability management tools including the ability to deploy, configure, and run these tools.
- Demonstrated experience with vulnerability concepts and prevalent vulnerability types such as SQL injection, cross-site scripting (XSS), cross-site request forgery (CSRF), path traversals, denial of service (DoS), buffer overflows, command injection, race conditions, open redirects, privilege escalation, authentication bypasses, XML External Entity (XXE) attacks and similar.
- Demonstrated experience with privilege and high/low trust boundaries and what defines a vulnerability vs. weakness.
- Demonstrated experience with vulnerability and risk scoring frameworks and methodologies such as CVSSv2 and CVSSv3.
- Demonstrated experience with vulnerability repositories (NVD, CVE MITRE, and VULdb) and exploitation techniques (MITRE ATT&CK and DEFEND).
- Demonstrated experience with web application (OWASP) and OS-level vulnerability categories and documentation.
- Demonstrated experience communicating how an attacker would exploit vulnerabilities and the types of attacks they could be used for.
- Demonstrated experience with the general threat landscape of an IT network and how vulnerabilities and exploitation of them impact it.
- Demonstrated experience with patch management and software development lifecycle (SDLC).
- Demonstrated experience in security operations, vulnerabilities and exploitation, network security, cloud security, and a comprehensive background in information security.
- Demonstrated experience with commercially available threat intelligence sources and toolsets.
- Demonstrated experience with using open-source and human information sources to track and collect information on adversaries, malware, campaigns, and related malicious infrastructure.
- Demonstrated experience conducting all-source research on a wide range of cyber issues.
- Demonstrated experience with leveraging Tableau or PowerBI to collect and visualize metric data.
- Demonstrated experience administering a SharePoint environment.
- Demonstrated experience with portfolio management.
- Demonstrated experience resolving complex problems including organizing and structuring solutions.
- Demonstrated experience developing executive level briefing materials and reports.
- Demonstrated experience with Program and Project Management methodologies.
- Demonstrated experience with ServiceNow and JIRA.
- Demonstrated experience eliciting and identifying requirements.
- Demonstrated experience reviewing program and generating formal review documentation.
- Demonstrated experience coordinating, supporting, and participating in program meetings and reviews.
- Demonstrated experience reviewing and identifying inconsistencies in program plans.
- Demonstrated experience supporting division-level budget and plans activities.
- Demonstrated experience with project management activities such as planning projects, meeting objectives, developing contingencies, and producing schedules.
- Demonstrated experience managing meetings to include meeting minutes, organizing, scheduling, and facilitating.
Highly Desired skills and demonstrated experience
Skills and demonstrated experiences that are highly desired but not required to perform the work include:
- Demonstrated experience communicating vulnerability results and risk posture to senior executives.
- Demonstrated experience performing complex technical tasks with minimal direction.
- Bachelor's degree in Computer Science, Information Systems, Engineering, or other related scientific or technical discipline.
- Demonstrated experience with Confluence.
- Demonstrated experience with advanced analytic features within Excel such as PivotTables, PivotCharts, VLOOKUP.
- Demonstrated experience in malware reverse-engineering techniques.
Demonstrated experience in threat hunting in large distributed environments.
Regards,
Radiantze Inc
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job
- Dice Id: 91140385
- Position Id: 8503568
Job Tags
Contract work, Remote job,