Careers

Incident Analyst (Level II)

PEAKE is a fast-growing technology company based in Maryland. We are looking for a self-motivated individual to join our Team immediately as an experienced Incident Analyst, Level II.

Level II (AO02)—Analyze and defines security requirements for MLS issues. Design, develop, engineer, and implement solutions to MLS requirements. Guide effort to gather and organize technical information about an organization’s mission goals and needs, existing security products, and ongoing programs in the MLS arena. Perform risk analyses which also includes risk assessment. Develop security standards.

Required:

  • DoD Secret Clearance
  • Current DoD 8570.01-M CSWF IAT Level II certification
  • CEH or CND-IR
  • Four to Six years’ experience MLS arena

Experience Requirements:

  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs])
  • Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody)
  • Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence)
  • Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Knowledge of types and collection of persistent data
  • Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Skill in using scientific rules and methods to solve problems
  • Knowledge of social dynamics of computer attackers in a global context
  • Knowledge of basic concepts and practices of processing digital forensic data
  • Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES])
  • Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools
  • Knowledge of incident response and handling methodologies
  • Knowledge of operating systems
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Knowledge of server and client operating systems
  • Knowledge of server diagnostic tools and fault identification techniques
  • Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications
  • Skill in developing, testing, and implementing network infrastructure contingency and recovery plans
  • Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., central processing units [CPUs], network interface cards [NICs], data storage)
  • Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT])
  • Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody)
  • Knowledge of hacking methodologies in Windows or Unix/Linux environment
  • Knowledge of investigative implications of hardware, operating systems, and network technologies
  • Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence)
  • Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Knowledge of types and collection of persistent data
  • Knowledge of webmail collection, searching/analyzing techniques, tools, and cookies
  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
  • Skill in analyzing memory dumps to extract information
  • Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics)
  • Skill in identifying, modifying, and manipulating applicable system components (Windows and/ or Unix/Linux) (e.g., passwords, user accounts, files)
  • Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data

 

Send Your Resume

Want to Host a Rally?

Pin It on Pinterest