Qualifications
You should have broad expertise with multiple operating systems and a strong networking background to include network security devices. If you routinely visit network security websites, attend conferences, or maintain your own network we would like to talk to you! If you're a "gamer", enjoy watching "The Big Bang Theory", love the Black Hat Briefings and Capture the Flag events, then you need to talk to us. Can you successfully "smash the stack?" If so, we are looking for you. Applicants should also have knowledge and experience in:
1. Understanding of networking concepts, protocols, and implementations. (e.g. TCP/IP, routing, DNS, etc)
2. Understanding of operating system concepts in both Windows and Solaris/Linux. (e.g. processes and threads, file systems, memory, etc)
3. Proficiency with Windows and Solaris/Linux Command-line tools.
4. Proficiency with system administration on Windows and Solaris/Linux systems.
5. Hands-on experience managing, maintaining, troubleshooting, installing, and operating common operating systems and basic network infrastructure.
6. Understanding of and ability to describe current network technologies. (e.g. routers, switches, firewalls, etc)
7. Experience with structured programming and scripting.
8. Understanding of common security solutions and their implementations (e.g. firewalls, intrusion detection systems, virus detection tools, etc)
This fast paced critical position requires someone with solid decision making skills, ability to react quickly, and technical :
Technical Competencies:
Operating system and network analysis
Operating system administration (Windows and Unix/linux)
Intrusion detection and response
Penetration testing
Packet analysis
Computer and network forensics
Low level protocol analysis
Network administration
Vulnerability Analysis
Malicious code analysis
General Competencies:
Critical Thinking
Problem Solving
Entry is with a High School diploma and 4 years of experience, or an Associate's degree and 3 years of experience, or a Bachelor's degree and no experience.
With no experience, degree must be in Computer Science or related field (e.g., Telecommunications, Computer Engineering, Electrical Engineering, Mechanical Engineering, Computer Forensics, Cyber Security, IT, or Information Systems)
Experience in network and system administration, IT support, infrastructure support, programming, field engineering, telecommunications, vulnerability analysis, penetration testing, computer forensics, cyber security, or related experience.
Experience with military training in a relevant area such as JCAC, DNA, etc.
A Bachelor's degree in Computer Science, Computer Engineering, or Networking/Telecommunications is preferred.
.