The Senior Systems Analyst and Exploitation Engineer will oversee technical areas such as Independent Verification & Validation (IV&V), Red-Team Vulnerability Assessment, and Penetration Testing . In addition, the candidate will perform Re verse Engineering and Exploit Gen eration . The candidate m ust have proposal writing experience and excellent presentation skills.
Required Skills and Responsibilities
Establish technology roadmap and build program area
Guide the technical direction of multiple programs
Serve as technical advisor for group of technical leads, engineers, and program manager
Interest in pursuing vulnerability identification, software analysis, and program understanding
Vulnerability Testing, Penetration Testing
Reverse Engineering of both hardware and software
TCP/IP and Network Security
Programming Skills - C, C++, Assembly, Perl, Python, SH/Bash, Bash Script
Operating Systems - Windows (XP, Vista, 7, NT), Linux/Unix, Virtualization
Certification - Certified Ethical Hacker
Software Applications - MS Office, Win Debugger, Wireshark
Programming Skills - JAVA, Ruby, PHP, SQL
Operating Systems - Windows CE, Windows Servers, Free BSD, MAC, Solaris, OSX, Cellular, MS DOS
Certifications - Network+, Security+, CCNA Security, CCNA, CCNP, CNA, CSSA, CISSP, CNNP Security
Software Applications - MS Visio, Ida Pro
Qualifications and Education Requirements
Security Clearance Requirements: Must be a U.S. citizen. Applicants selected may be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Bachelor's Degree in Computer Science, Computer Engineering, Electrical Engineering, or related discipline and 10+ years of work related experience; work related experience can be substituted for degree requirements.
AIS is an equal opportunity employer and considers qualified applicants for employment without regard to race, color, creed, religion, national origin, sex, sexual orientation, gender identity and expression, age, disability, or Vietnam era, or other eligible veteran status, or any other protected factor.
Assured Information Security, Inc - 9 months ago