Programmer/Analyst - Info Assurance

7 days left

Location
Princeton, New Jersey
Posted
Feb 02, 2017
Closes
Aug 26, 2017
Function
Analyst, IT, QA Engineer
Hours
Full Time

Overview

Under general supervision, defends CCR-P's computers from external and internal attack, and prevents  or detects data spillage.

Responsibilities

  1. Designs, implements, maintains and monitors controls and procedures to prevent external penetration of CCR-P computer systems, detects advanced persistent threats (APT) and assists to isolate and eliminate them, detects malfeasance by computer users and report insider threats, and detects and reports data spillage.
  2. Designs, documents, writes, tests, and deploys programs that continuously monitor CCR-P computer systems for abnormal conditions.
  3. Designs, writes, maintains and runs content analysis programs to automatically detect data that may be inadequately protected.
  4. Monitors computer security logs, audits trails and intrusion detection flags on a daily basis to detect security anomalies.
  5. Reviews and/or sets configuration parameters on defensive computer security and SIEM appliances.
  6. In cooperation with system administration staff, runs automated and manual checks to verify that CCR-P system configurations match their specifications.
  7. Runs automated vulnerability detection tools and malware detection suites, and analyze the results.
  8. Provides forensic and incident response support to CCR-P's Information Systems Security Officer, as required.
  9. Performs other duties as assigned.

Qualifications

  • U.S. Citizenship is required.
  • Bachelor's Degree, or Associate Degree with five years’ experience in IA field.
  • Mastery of Linux command line interface and UNIX file system permissions.
  • Working knowledge of Windows Server operating system and command line tools.
  • Working knowledge of TCP/IP networking.
  • Ability to read, design, and write new Bash scripts, Perl scripts, SNORT signatures, cron jobs, and SPLUNK filters, to implement defensive techniques.
  • Ability to use vulnerability analysis tools, such as Nessus and Metasploit, to detect vulnerabilities.
  • Ability to set SIEM thresholds and use tools like SNORT, Netflow, and firewall and appliance logs to detect attacks.
  • Ability to use packet capture, memory analysis, and other forensic tools to understand specific attacks.
  • Ability to communicate clearly verbally and in writing.
  • Ability to attain the DoD Directive 8570 Computer Network Defense Analyst (CND-A) qualification shortly after starting work.
  • Ability to obtain and maintain necessary security clearances.