Advanced Cyber Auditor
Minimum Clearance Required to Start:Top Secret SCIJob Description:JOB DESCRIPTIONAdvanced Cyber Auditor (ACA)SUMMARYAre you ready for a challenge that will keep you on the cutting edge of cyber-security while supporting multidisciplinary mission assurance / vulnerability assessments on critical mission systems? Parsons provides comprehensive cyber security expertise for national defense programs and is seeking employees with an eye for detail, a drive to succeed, and a passion for ensuring mission success.The Advanced Cyber Auditor (ACA) is a specialized but integral member of the Defense Threat Reduction Agency (DTRA) Mission Assurance/Vulnerability Assessment Team. As such, the ACA will be part of a small, mobile defensive cyber operations assessment team working with the most current network analysis, TAP technology, forensic software, and network auditing Commercial-Off-The-Shelf (COTS) and open source tools available. The ACA will use DTRA's mobile Computer Network Defense/Exploitation (CND/E) tool kit to perform on-demand network and vulnerability assessments, digital forensics, finger printing, network traffic analysis, full packet capture and session replay, security information, and event management for real-time analysis of correlated data captures. The ACA will assess the survivability of critical US and allied national/theater mission systems, networks, architectures, infrastructures, and assets. Assessment teams aim to ensure continuity to critical DoD missions and infrastructure by assessing the vulnerabilities and survivability against a broad spectrum of threats including accidents, natural disasters, technological failure, cyber-attacks, terroristsation-state actors, radio frequency (RF) weapons, sabotage, and weapons of mass destruction (WMD).Assessment teams may deploy to high threat but permissive environments anywhere in the world. CONUS and OCONUS travel required up to 33% of the time for durations of up to two weeks per trip.Top Secret/SCI Security Clearance eligibility requiredESSENTIAL DUTIES AND RESPONSIBILITIES* Review and assess all aspects of the customer's mission by conducting full packet capture analysis of customer network traffic* Inspect network traffic for non-authorized activity or any form of network exploitation and compromise using a variety of network security sensor applications* Analyze data traffic inspection results and present results and findings in a clear and concise manner* Prepare reports and briefings to include recommendations for mitigation techniques* Run network modeling and configuration compliance/vulnerability scanning tools on computer networksEDUCATION AND/OR EXPERIENCE* Possess a Bachelor's degree in Computer Security, Computer Science, Computer Engineering, Electrical Engineering, or related technical discipline; commensurate operational experience can serve as a substitute for degree requirements* Possess 3-5 years operational experience in the military, other Federal Government, or comparable civilian position in Cyberspace operations* Possess minimum of 3 years of experience specifically conducting full packet capture analysis and mandatory experience in network and system administration, TAP technologies, virtualization administration, *Nix O/S, and server technologies* Possess IAT III (ie, CISSP) and CSSP Auditor (ie, GCIA, C|EH, GSNA, CISA) certifications as defined and described in DoD 8570.01-M; computing environment certification such as CCNA or Linux+; or ability to obtain certifications within 180 days of hire* Possess Information Operations and CND experience as defined and described in Joint Publication 3-13, Information Operations and DoD 8570.01-M. * Possess OSCP, GCIA, GCIH (or any related GIAC certification), WCNA, CCNA, CCNP, CCIE and MCSE information technology certifications* Previous experience conducting vulnerability-based network security assessments desiredKNOWLEDGE, SKILLS, AND ABILITIES* Working knowledge of the Risk Management Framework (RMF) to include DoD's system security authorization agreements (SSAA). * Strong experience with network security monitoring, threat hunting, network packet analysis, malware analysis, signature development, and shell scripting* Ability to install, configure, and administer network security monitoring (NSM) software applications* Ability to troubleshoot hardware and software problems* Ability to configure, manage, and maintain networking equipment* Strong computer networking skills and experience with network firewalls* Possess a working knowledge of computer network modeling software* Possess a working knowledge of computer network vulnerability and compliance scanning/analysis software (eg, Tenable Nessus)* Possess excellent written and verbal communication skills* Possess expert knowledge of Microsoft Office Suite (Word, Excel, PowerPoint, Visio) to prepare presentations, reports, and white papers* Work network models using MS Visio* Experience with network packet capture technologies and all mainstream protocol analyzers * Experience performing manual packet analysis with a hex editor* Programming experience (Perl, Python, C, etc.)Must be able to obtain, maintain and/or currently possess a security clearance.