NetSage's mission is to help our customers achieve their missions by providing superior cyber services. We seek talented professionals who are interested in doing meaningful, mission-focused work for the US Federal Government. We are a growing Company that puts our employees first and offers excellent pay and world-class benefits. We do not hire contract by contract; instead, we offer multiple job options and career progression for our employees. We realize that our website and job descriptions may be a little vague and that's on purpose because of the customers we support. Please connect with us using our Contact Us page if you have any questions about any of our job-openings.
Network Threat Analysts possess the skills to analyze, map, protect, or discover vulnerabilities, intrusions, and threats in computer network systems. In this role, the Threat Analyst will perform in-depth analysis of computer and network intrusion incident data; conduct technical analysis of network traffic to detect and de-obfuscate malicious activity; conduct analysis of malicious code; and develop countermeasures. The ability to research, analyze, and report on computer probe and network infiltration attempts on network infrastructure is required. Additional skills that may be needed include a knowledge of forensic media analysis, and experience using commercial forensic tools to image and review computer drives/ data to determine if an incident occurred and establish the intrusion method used.
Please consider applying if you have the required qualifications and experience.
TS/SCI with polygraph security clearance.
At least six (6) years of experience in network and vulnerability analysis, or a Bachelor’s degree in computer science, information systems, or computer engineering and three (3) years of experience.
Five (5) years of Intelligence Community or related experience in network and vulnerability analysis.
Ability to identify anomalies at the packet level.
Ability to perform intrusion incident response.
Experience identifying malicious cyber activity.
Ability to discover unknown, suspicious, or exploitation activity.
Ability to provide formal briefings on intrusion activity.
Expertise in documenting information, analysis, and processes.
Experience with tools such as Wireshark, IDA Pro, MetaSploit, IDS, Nmap, WinHex, Encase, OlyDbg, Snort, and tcpdump.