Job Summary
Cyber Warfare Engineer As a cyber warfare engineer, you will conduct testing and analysis for identifying vulnerabilities and potential threat vectors in systems and networks, identifying or developing content that serves to circumvent or defeat security features, and engineering attack methodologies. You’ll advanced consulting skills, extensive technical expertise, and full industry knowledge to articulate activities in a manner that clearly defines the scope of the engagement so that cybersecurity professionals may further develop or enhance blue force operations to mitigate threat vectors. In this role, you’ll develop innovative solutions to complex problems, develops proof of concept code or exploits, and conducts meticulous documentation of all activities and operations. You’ll without considerable direction, and mentors and may supervise team members. At Booz Allen, you can use your cyberspace operations experience to create solutions that will be executed on a worldwide stage.
- Minimum Qualification: Degree
- Experience Level: Mid level
- Experience Length: 3 years
Job Description/Requirements
You Have:
- 3+ years of experience with cybersecurity tools and techniques
- 1+ years of experience in programming with Python, C/C++, or Java
- Experience with Automation tools such as Ansible or PuppetÂ
- Knowledge of penetration testing or red team operations
- Knowledge of cyber-physical systems, architectures, and protocols
- Ability to build and test virtual machines such as VirtualBox, VMWare, or Parallels
- Ability to be self-motivated and work with minimal supervision
- TS/SCI clearance
- Bachelor’s degree
  Â
Nice If You Have:  Â
- Experience with reading, modifying, or creating *NIX shell scripts or Windows PowerShell scripts
- Knowledge of blue force training operations or proficiency requirements and of risk frameworks such as NIST Risk Management Framework, MITRE ATT&CK/D3FEND, or Diamond ModelÂ
- Knowledge of processes and best practices related to the management of information and technology risks Â
- Knowledge of security standards and information security and compliance frameworks, controls, and best practices
- Knowledge of military assessments, training evaluations, and after-action reviews (AARs)
- Knowledge of cyber threats detection and mitigation, dynamic malware analysis
Important Safety Tips
- Do not make any payment without confirming with the Jobberman Customer Support Team.
- If you think this advert is not genuine, please report it via the Report Job link below.