Advanced Cyber Auditor
Minimum Clearance Required to Start:Top Secret SCIJob Description:JOB DESCRIPTIONAdvanced Cyber Auditor (ACA)SUMMARYAre you ready for a challenge that will keep you on the cutting edge of cyber-security while supporting multidisciplinary mission assurance / vulnerability assessments on critical mission systems? Parsons provides comprehensive cyber security expertise for national defense programs and is seeking employees with an eye for detail, a drive to succeed, and a passion for ensuring mission success.The Advanced Cyber Auditor (ACA) is a specialized but integral member of the Defense Threat Reduction Agency (DTRA) Mission Assurance/Vulnerability Assessment Team. As such, the ACA will be part of a small, mobile defensive cyber operations assessment team working with the most current network analysis, TAP technology, forensic software, and network auditing Commercial-Off-The-Shelf (COTS) and open source tools available. The ACA will use DTRA's mobile Computer Network Defense/Exploitation (CND/E) tool kit to perform on-demand network and vulnerability assessments, digital forensics, finger printing, network traffic analysis, full packet capture and session replay, security information, and event management for real-time analysis of correlated data captures. The ACA will assess the survivability of critical US and allied national/theater mission systems, networks, architectures, infrastructures, and assets. Assessment teams aim to ensure continuity to critical DoD missions and infrastructure by assessing the vulnerabilities and survivability against a broad spectrum of threats including accidents, natural disasters, technological failure, cyber-attacks, terrorists/Nation-state actors, radio frequency (RF) weapons, sabotage, and weapons of mass destruction (WMD).Assessment teams may deploy to high threat but permissive environments anywhere in the world. CONUS and OCONUS travel required up to 33% of the time for durations of up to two weeks per trip.Top Secret/SCI Security Clearance eligibility requiredESSENTIAL DUTIES AND RESPONSIBILITIESReview and assess all aspects of the customer's mission by conducting full packet capture analysis of customer network trafficInspect network traffic for non-authorized activity or any form of network exploitation and compromise using a variety of network security sensor applicationsAnalyze data traffic inspection results and present results and findings in a clear and concise mannerPrepare reports and briefings to include recommendations for mitigation techniquesRun network modeling and configuration compliance/vulnerability scanning tools on computer networksEDUCATION AND/OR EXPERIENCEPossess a Bachelor's degree in Computer Security, Computer Science, Computer Engineering, Electrical Engineering, or related technical discipline; commensurate operational experience can serve as a substitute for degree requirementsPossess 3-5 years operational experience in the military, other Federal Government, or comparable civilian position in Cyberspace operationsPossess minimum of 3 years of experience specifically conducting full packet capture analysis and mandatory experience in network and system administration, TAP technologies, virtualization administration, *Nix O/S, and server technologiesPossess IAT III (ie, CISSP) and CSSP Auditor (ie, GCIA, C|EH, GSNA, CISA) certifications as defined and described in DoD 8570.01-M; computing environment certification such as CCNA or Linux+; or ability to obtain certifications within 180 days of hirePossess Information Operations and CND experience as defined and described in Joint Publication 3-13, Information Operations and DoD 8570.01-M.Possess OSCP, GCIA, GCIH (or any related GIAC certification), WCNA, CCNA, CCNP, CCIE and MCSE information technology certificationsPrevious experience conducting vulnerability-based network security assessmentsdesiredKNOWLEDGE, SKILLS, AND ABILITIESWorking knowledge of the Risk Management Framework (RMF) to include DoD's system security authorization agreements (SSAA).Strong experience with network security monitoring, threat hunting, network packet analysis, malware analysis, signature development, and shell scriptingAbility to install, configure, and administer network security monitoring (NSM) software applicationsAbility to troubleshoot hardware and software problemsAbility to configure, manage, and maintain networking equipmentStrong computer networking skills and experience with network firewallsPossess a working knowledge of computer network modeling softwarePossess a working knowledge of computer network vulnerability and compliance scanning/analysis software (eg, Tenable Nessus)Possess excellent written and verbal communication skillsPossess expert knowledge of Microsoft Office Suite (Word, Excel, PowerPoint, Visio) to prepare presentations, reports, and white papersWork network models using MS VisioExperience with network packet capture technologies and all mainstream protocol analyzersExperience performing manual packet analysis with a hex editorProgramming experience (Perl, Python, C, etc.)Must be able to obtain, maintain and/or currently possess a security clearance.