Do you want to join a fast-growing, dynamic company working on the latest technology contracts across the country?
ISPA Technology is that company. We have been listed 4 years in a row on the Inc. 5000 Fastest Growing Companies. We offer a great company culture, competitive salary & bonus potential, a superior benefits package, and much more!
The contractor will address the technical implementation of Mission Planning Center (MPC) and cross-domain solution (CDS) technologies. Plan, execute, and report on MPC system configurations and deploy new capabilities, as required. Analyze new Cyber threats, provide technical guidance to mitigate threats, and interpret and develop approaches to meet the intent of new Cyber policy as it impacts MPC systems. Perform vulnerability scanning and reporting of system configurations for Windows and UNIX-based operating systems. Maintain a secure and updated system baseline configuration to support system fielding requirements for multiple current and future system variants. Interface with system components to integrate with new data types and test component operations. Maintain the performance and operation of the MPC and provide training and test environments commensurate with real world scenarios.
Job Duties Include (but not limited to):
Provides technical leadership for cyber security and trusted systems technology.
Design, develop, test, and document cryptographic products, trusted networks, database management systems and telecommunications subsystems.
Research and make recommendations regarding cyber security policies, certification and accreditation reviews, security test and evaluation reports, trusted computing base architectures, and security engineering practices and processes.
Lead cyber security engineering tasks including MPC policy development, asset and risk assessment, security specifications/architecture/plan development, digital signature systems development and/or installation, key and certificate management, trusted computing base implementation/support, systems Certification & Accreditation support, and hands-on development/operation of pilot/prototype information security applications.
Conduct analyses of the current DoD information security architecture and reports comparative assessments of alternate approaches.
Design, develop, debug, test, document, and maintain MPC security applications.
Responsible for maintaining the integrity and security of MPC enterprise-wide cyber systems and networks.
Support cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
Coordinate resources during enterprise incident response efforts. Drive incidents to timely and complete resolution.
Source, install, maintain, and employ advanced forensic tools and techniques for attack modeling and reconstruction – including dead system analysis and volatile data collection and analysis.
Perform network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cyber security of communications networks.
Reviews threat data from various sources and develops custom signatures for Open Source IDS or other custom detection capabilities.
Correlates actionable security events from various sources including Security Information Management System (SIMS) data and develops unique correlation techniques.
Utilizes understanding of attack signatures, tactics, techniques and procedures associated with advanced threats. Develops analytical products fusing enterprise and all-source intelligence.
May conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker encoding protocols.
Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies within the Department of Defense.
Assist in furthering U-2 Research & Development Laboratory initiatives.
Required Skills & Experience:US Citizenship
Previous experience as a Cyber Security Specialist.
Security+ CE (or higher), SSCP, or GSEC.
Significant experience with computer security concepts.
Significant experience with networking, system administration and security.
Significant experience with analyzing and investigating computer network intrusions.
Significant experience with malware analysis.
Significant experience with conducting data analysis
CISSP certification IAW DoD 8570.01-M.
Experience with Link-16 and other 4th/5th generation datalinks.
Knowledge of tactical radio configuration, use, and troubleshooting.
Knowledge of Line-of-Sight and Beyond Line-of-Sight communications.
Knowledge of open architectures.
Knowledge of multi-domain systems.
Significant experience with integrating and securing C4ISR systems.
Ability to analyze IP packet captures with tools.
Education & Certifications: