As a successful candidate for the Technology Vulnerability Analyst II, you will identify vulnerabilities of and attacks to various physical, chemical, and electromagnetic characteristics and properties of signals, equipment, and security mechanisms.
,
-
Characterize those attacks with respect to resources and capabilities required to accomplish those attacks and relate those vulnerabilities and attacks to their effects on the operations and missions supported by those systems
-
Compare and contrast signals and equipment attack techniques and develop operationally effective countermeasures
-
Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied
QUALIFICATIONS A Doctoral degree with 2 years, a Master’s degree with 3 years of relevant experience, a Bachelor’s Degree with 5 years of relevant experience, or an Associate’s degree with 7 years of experience is required. Degree must be in Computer Science or a related field (e.g. General Engineering, Computer Engineering, System Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required (i.e. 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months or experience).
,
Black Eagle Defense is a Maryland-based small business that provides Information Technology, Cybersecurity, and related Consulting Services to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape.
We are proud to be an Equal Employment Opportunity and Affirmative Action employer.