We are currently seeking a Target Analyst Reporter (TAR) to join our team and support critical national security missions in the Fort Meade area. Candidate must be fully cleared.
Qualifications
-
At least seven (7) years experience in two (2) or more of the following (see "LCAT Substitutes" Education for substitutes to this requirement for a total of four [4] years only):
-
Computer Network Exploitation
-
Vulnerability Assessment
-
Penetration Testing
-
Incident Response
-
Network and/or server forensics
-
Cryptoanalytic work in military or intelligence community organization
-
Cryptology in military or intelligence community organization
-
At least one (1) year of experience in two (2) or more of the following:
-
File Hashing and Fuzzy File Hashing (e.g., ssdeep, fciv, and md5deep)
-
Commercial, open source or GOTS tools for intrusion detection (e.g., Snort, BroIDS)
-
Packet capture/evaluation (e.g., tcpdump, ethereal/wireshark, NOSEHAIR)
-
Network mapping/discovery (e.g.,nmap, TRICKLER)
-
Industry standard system/network tools (e.g., netcat, netstat, traceroute, rpcinfo, nbtscan, snmpwalk, Sysinternals suite)
-
At least two (2) years of experience in one (1) or more of the following:
-
Development of exploits for Microsoft Windows operating systems
-
Development of exploits for UNIX operating systems
-
Development of exploits for personal computer device/mobile device operating systems (e.g., Android, Blackberry, iPhone, and iPad)
-
Software Reverse Engineering to include use of code disassemblers (e.g., IDA Pro) and debugging unknown code (e.g. Ollydbg)
-
Analysis of code in memory, including analysis of RAM snapshots, Windows crash dump files, and/or UNIX kernel dumps
-
Implementing networks with IPv6 protocols