View all jobs

Target Digital Network Analyst (TDNA)

Laurel, MD · Information Technology
Why Work at SI?

Secure Innovations (SI) successfully and continuously strives to become experts in the Cybersecurity field by only focusing on Cyber!  Because of this, we proudly stand behind our motto, "We're Not Standard Cyber. We're the Cyber Standard."

SI was built on the principle that people matter first and foremost.  SI believes in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth.  We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals.

At least five (5) years experience in two (2) or more of the following (see “LCAT Substitutes” Education for substitutes to this requirement for a total of four [4] years only):
  1. Computer Network Exploitation, Computer Network Attack
  2. Vulnerability Assessment
  3. Penetration Testing
  4. Incident Response
  5. Network and/or host forensics
  6. Cryptanalytic work in military or intelligence community organization
  7. Cryptology work in military or intelligence community organization
At least three (3) years of experience in three (3) or more of the following:
  1. Analysis of host data at rest, including:
    1. Microsoft Windows operating systems, system internals, file attributes
    2. Executable file analysis (particularly PE files including dynamic linked libraries)
    3. File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep)
  2. Forensic analysis of Windows systems, Linux systems, and/or mobile devices
  3. Commercial, open source of GOTS tools for intrusion detection (e.g., Snort, BroIDS)
  4. Packet capture/evaluation (e.g, tcpdump, ethereal/wireshark, NOSEHAIR)
  5. Network mapping/discovery (e.g., nmap, TRICKLER)
  6. Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
  7. Exploit development of Microsoft Windows operating systems
  8. Exploit development of Linux operating systems
  9. Exploit development of personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
  10. Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g., Ollydbg)
  11. Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or Linux kernel dumps
  12. SID(S2)/NTOC analysis and production working cyber adversary intrusion set/targets, foreign network intelligence analysis or the identification and extraction of digitally transported information.


Share This Job

Powered by