View Our Website View All Jobs

Intrusion Detection Analyst / Vulnerability Assessment Analyst - Top Salaries Offered

*You must have an active U.S. Government Top Secret Security Clearance.*

Location: Edmund Halley Drive,  Reston, VA

Position Title:  Network Security – Intrusion Detection Analyst / Vulnerability Assessment Analyst

Position Description:

The team is seeking a qualified contributor to provide network security and intrusion detection support. Work includes conducting forensics on end-point devices and network logs, reverse engineering, writing intelligence and forensics reports, and deep packet analysis. Join our team in protecting our nation from its adversaries.



·         Analyze network traffic logs using Bro, Wireshark, and similar tools

·         Build and configure virtual machines in a test-bed environment

·         Develop commands and shell scripts in Bash/Linux

·         Detect network-based threats

·         Build network-based threat scenarios for table-top exercises

·         Conduct network vulnerability assessments and carry out basic penetration tests

·         Participate in red and blue team penetration testing activities and CTF exercises

·         Write detailed reports for response actions & incident handling

·         Articulate vulnerabilities, threats, and incidents to managers


Required Qualifications:

·         Requires active Top Secret Clearance

·         Bachelors degree and four (4) years of related experience preferred. If applicable, degree should be in Computer Science, Information Technology, or Cyber Security. In lieu of degree, four (4) additional years of related experience may be considered.

·         Three (3)+ years’ experience operating in a SOC or similar environment

·         Understanding of OSI Network Model

·         Two (2)+ years’ experience Conducting network vulnerability assessments

·         Network monitoring such as Netflow, Bro, or full/deep packet inspection

·         Experience working in virtual machines

·         Knowledge of desktop, mobile, and internet-of-things platforms

·         Writing detailed reports of potential vulnerabilities and post-infection events

·         Understanding of VPN, VLAN, cloud, and mobile network technologies


Desired Qualifications:

·         Familiar with network-attack behavior such as malware C2, exploit kits, Trojans, phishing techniques

·         Network penetration testing

·         Intelligence or threat analysis experience

·         Writing YARA signatures

·         Reverse engineering experience highly preferred

·         Excellent written and oral communication

·         Certifications in one of the following: CCNA, CCSP, CEH, CCE, CFE, SANS GCIA, GCIH, GCFA, CISSP

Read More

Apply for this position

Apply with Indeed
Attach resume as .pdf, .doc, or .docx (limit 5MB) or Paste resume

Paste your resume here or Attach resume file

Human Check*