This position represents a proposal or pipelining requisition for potential upcoming work. If you meet the qualifications, please submit your resume and we will consider you for this opportunity in the future.
The candidate will provide the government with specialized computer security experience as it pertain to the analysis of and protection against computer-based attacks. The candidate will work at BAE Systems and have the following skill set:
Specialized product knowledge of Tier 1 Analysis products, DoD Enterprise tool (HBSS, SCVVI, SCRI, INTFoT) along and the ability to write custom-based signatures, ACL’s, etc. to protect against current and future attacks. Ability to analyze alert data from a variety of products and help the Government develop a strategy on how to address these threats. The candidate must be able to monitor and analyze data from a variety of network devices and provide security analyst support for a complex, global, wide area network, including firewalls, routers, switches, out-of-band management appliances, network analyzer appliances, virtual private network (VPN) appliances, intrusion detection systems (IDS) and communications circuits. Backbone and WAN support will consist of Internet connections and point-to-point, frame-relay and MPLS networks.
McAfee’s ePolicy Orchestrator (ePO); McAfee’s Host Intrusion Protection Service (HIPS), McAfee’s Policy Auditor (PA). General experience with Host Intrusion Detection System and Network Intrusion Detection Systems, SIM, Vulnerability and Remediation Management. Experienced with IA/CND training programs. Experience working with engineering teams and global software delployments. Knowledge of McAfee and Symantec Anit-Virus, IDS, root-kit, trojan methods, IA C&A with DIACAP, DOD policies. Knowledge of Hacking and counter attack techniques. 8+ Years with BS or 6+ Years with MS or 3+ Years with PhD Experienced with implementing DISA’s Security Technical Implementation Guides (STIG’s) and Security Readiness Scripts (SRR). Experience with DoD’s Information Assurance Vulnerability Management (IAVM) Process. Desired
The candidate must also have experience with Vulnerability Management System (VMS); experience with Retina Network Security Scanner; experience securing networks and network layer devices; experience securing Microsoft operating systems and products; experience securing UNIX operating systems; experience securing Oracle and SQL databases; experience securing web servers; and experience with Host-Based Security System (HBSS). Experience with IDS/IPS network devices. Experience with MS SQL and VMware.