Cyber Intelligence SME (Information Technology)

Company: KACE
Location: Arlington, Virginia, United States
Type: Full-time
Posted: 13.FEB.2021
< >

Summary

Cyber Intelligence SME (Information Technology) About KACE: When you make the decision to join KACE, you are choosing to work alongside tale...

Description

Cyber Intelligence SME (Information Technology) About KACE: When you make the decision to join KACE, you are choosing to work alongside talented professionals that have one thing in common; the passion to make a difference! KACE employees bring their diverse talents and experiences to work on critical projects that help shape the nation's safety, security, and quality of life. The desire to have a career that is purposeful and forward thinking is woven into every KACE employee...it's The KACE Way. KACE employees are; purpose driven, forward focused, open-minded, trustworthy and invested. The KACE Way is our commitment to our employees, to our customers, and to our communities.Join KACE and make a difference! We're looking to add a Cyber Operations SME. If you can envision joining a team where you will have the opportunity to provide mission driven results; then we are looking for you! Here is what you need to be successful in this role Action Oriented - Enjoys working hard; is action oriented and full of energy for the things s/he sees as challenging and able to provide high caliber hiring results. Creative - Your DNA is equal parts creative, resourceful, data-driven, flexible, and curious; with an ability to influence and build strong relationships. Results Driven - Can be counted on to exceed goals successfully, very bottom-line oriented; steadfastly pushes self and others for results. Curious -. Your curiosity and desire to stay on the leading edge of recruiting informs your strategy and allows you to deliver strong results in a competitive landscape. What You'll Get to Do!! Leads/ Performs operations research tasks of limited scope and difficulty. Plans work procedures and selects standard methods and techniques to be applied to development and assessment projects or problems solving studies. Assist in the training of cyber analysts related to dark web research methodologies and the collection of virtual currency transaction data from dark web sources. Applies the various steps of accepted operations research procedures to search for information to bear on a system, process, and/or operational problem, and performs techniques involving difficult calculations or exact comparability determinations. Perform special research tasks designed to utilize and enhance knowledge of work processes and techniques. Identifies dark web sources of data and performs data acquisition and reduction. Identifies and analyzes sources of virtual currency/ Cryptocurrency transactions taking place on the dark web. Make minor adaptations in techniques or method to achieve the objectives of the assignment. Develops reports which summarize accomplishments and results of assignments and presents findings within own organization. Keep abreast of emerging technologies and professional developments to remain current in the field and for application to work assignments. Other duties may be assigned. What you will need to have: 4 + years expertise current dark and general web hacking methodologies. 4 + years of exposure to laws, regulations, polices and ethics as they relate to cybersecurity and privacy. Experience with identifying and analyzing Virtual Currency/Cryptocurrency transactions occurring on the dark web. Experience using block chain analysis tools such as Chainalysis. Knowledge of current computer attacking methods and webmail collection searching/analyzing techniques and then the ability to produce a written report. 5 + years of recurring exposure to Linux, Mac OS and Microsoft computer operating systems. 5 + years of exposure to front-end collection systems including traffic collection, filtering, selection and internet routing protocols. 4 + years of familiarity with computer attack methods and techniques of brute force, spoofing etc. 4 + years of collecting, viewing, and identify essential information on target(s) of interest from metadata (e.g. email, http, social media). Ability to recognize technical information that may be used in leads to enable remote operation (data includes users, passwords, email addresses, IP ranges of the target, frequency in DNI (Digital Network Intelligence) behavior, mail servers, domain servers and header information) and then make immediate notification to the field in written/email format (weekly). Must communicate complex concepts or ideas in a confident and well-organized manner through verbal, written and/or visual means on a weekly basis. Clearance: Applicants selected will be subject to a Government background investigation and may need to meet eligibility requirements for access to classified information. Security Requirements: U.S. Citizenship Ability to obtain/maintain a Security Clearance Favorable credit check We Offer... Paid training, fun, talented and driven teammates Knowledgeable, encouraging, and present leadership A diverse and community-minded organization Career growth and learning opportunities for aspiring minds A competitive benefits package, and fosters a highly skilled, energized, and empowered workforce. If you have what it takes, apply now!! For more information about the company please visit our website at KACE is an Equal Opportunity Employer and does not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, gender identity, status as a veteran, disability or any other federal, state or local protected class.

 
Apply Now

Share

Free eBook

Flash-bkgn
Loader2 Processing ...