NetSage's mission is to help our customers achieve their missions by providing superior cyber services. We seek talented professionals who are interested in doing meaningful, mission-focused work for the US Federal Government. We are a growing Company that puts our employees first and offers excellent pay and world-class benefits. We do not hire contract by contract; instead, we offer multiple job options and career progression for our employees. We realize that our website and job descriptions may be a little vague and that's on purpose because of the customers we support. Please connect with us using our Contact Us page if you have any questions about any of our job-openings.
Job Description:
Network threat analysts possess the skills to analyze, map, protect, or discover vulnerabilities, intrusions and threats in computer network systems. Threat analysts will perform in-depth analysis of computer and network intrusion incident data and technical analysis of network traffic to detect malicious activity. Threat analysts will conduct analysis of malicious code and develop countermeasures. The ability to research, analyze, and report on computer probe and network infiltration attempts on network infrastructure is required. Knowledge of forensic media analysis, use of commercial forensic tools to image and review computer drives and data and determine if an incident occurred and the intrusion method used may be needed.
Please consider applying if you have the required qualifications and experience.
Required Qualifications:
TS/SCI with polygraph security clearance
A minimum of eight (8) years experience in network and vulnerability analysis, or a Bachelor’s degree in computer science, information systems, or computer engineering and five (5) years experience
Five (5) years of Intelligence Community or related experience in network and vulnerability analysis
Identify anomalies at the packet level
Perform intrusion incident response
Experience in identifying malicious cyber activity
Ability to discover unknown, suspicious or exploitation activity
Ability to provide formal briefings on intrusion activity
Expertise in documenting information, analysis and processes
Experience with tools such as the following: Wireshark, IDA Pro, MetaSploit, IDS, Nmap, WinHex, Encase, OlyDbg, Snort, tcpdump