Or your alerts
1 month ago

Job Summary

Cyber Warfare Engineer As a cyber warfare engineer, you will conduct testing and analysis for identifying vulnerabilities and potential threat vectors in systems and networks, identifying or developing content that serves to circumvent or defeat security features, and engineering attack methodologies. You’ll advanced consulting skills, extensive technical expertise, and full industry knowledge to articulate activities in a manner that clearly defines the scope of the engagement so that cybersecurity professionals may further develop or enhance blue force operations to mitigate threat vectors. In this role, you’ll develop innovative solutions to complex problems, develops proof of concept code or exploits, and conducts meticulous documentation of all activities and operations. You’ll without considerable direction, and mentors and may supervise team members. At Booz Allen, you can use your cyberspace operations experience to create solutions that will be executed on a worldwide stage.

  • Minimum Qualification: Degree
  • Experience Level: Mid level
  • Experience Length: 3 years

Job Description/Requirements

You Have:

  • 3+ years of experience with cybersecurity tools and techniques
  • 1+ years of experience in programming with Python, C/C++, or Java
  • Experience with Automation tools such as Ansible or Puppet 
  • Knowledge of penetration testing or red team operations
  • Knowledge of cyber-physical systems, architectures, and protocols
  • Ability to build and test virtual machines such as VirtualBox, VMWare, or Parallels
  • Ability to be self-motivated and work with minimal supervision
  • TS/SCI clearance
  • Bachelor’s degree

   

Nice If You Have:   

  • Experience with reading, modifying, or creating *NIX shell scripts or Windows PowerShell scripts
  • Knowledge of blue force training operations or proficiency requirements and of risk frameworks such as NIST Risk Management Framework, MITRE ATT&CK/D3FEND, or Diamond Model 
  • Knowledge of processes and best practices related to the management of information and technology risks  
  • Knowledge of security standards and information security and compliance frameworks, controls, and best practices
  • Knowledge of military assessments, training evaluations, and after-action reviews (AARs)
  • Knowledge of cyber threats detection and mitigation, dynamic malware analysis

Important Safety Tips

  • Do not make any payment without confirming with the Jobberman Customer Support Team.
  • If you think this advert is not genuine, please report it via the Report Job link below.
Report Job

Share Job Post

Lorem ipsum dolor (Location) Lorem ipsum GHS Confidential

Job Function : Lorem ipsum

1 year ago

Lorem ipsum dolor (Location) Lorem ipsum GHS Confidential

Job Function : Lorem ipsum

1 year ago

Lorem ipsum dolor (Location) Lorem ipsum GHS Confidential

Job Function : Lorem ipsum

1 year ago

Stay Updated

Join our newsletter and get the latest job listings and career insights delivered straight to your inbox.

We care about the protection of your data. Read our privacy policy.

This action will pause all job alerts. Are you sure?

Cancel Proceed
Report Job
Please fill out the form below and let us know more.
Share Job Via Sms

Preview CV