logo

View all jobs

Target Analyst Reporter

Linthicum, MD · Information Technology
Why Work at SI?
Secure Innovations (SI) successfully and continuously strives to become experts in the Cybersecurity field by only focusing on Cyber!  Because of this, we proudly stand behind our motto, "We're Not Standard Cyber. We're the Cyber Standard."

SI was built on the principle that people matter first and foremost.  Our focus is on PEOPLE - our employees and our customers.  SI believes in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth.  We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals.

Qualifications:

At least seven (7) years experience in two (2) or more of the following:
  • Computer Network Exploitation
  • Vulnerability Assessment
  • Penetration Testing
  • Incident Response
  • Network and/or server forensics
  • Cryptoanalytic work in military or intelligence community organization
  • Cryptology in military or intelligence community organization

At least one (1) year of experience in two (2) or more of the following:
  • File Hashing and Fuzzy File   Hashing (e.g., ssdeep, fciv, and md5deep)
  • Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
  • Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
  • Network mapping/discovery (e.g.,nmap, TRICKLER)
  • Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)

At least two (2) years of experience in one (1) or more of the following:
  • Development of exploits for Microsoft Windows operating systems
  • Development of exploits for UNIX operating systems
  • Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
  • Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g. Ollydbg)
  • Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
  • Implementing networks with IPv6 protocols

 

Share This Job

Powered by