Careers

Incident Analyst (LEVEL III)

PEAKE is a fast-growing technology company based in Maryland. We are looking for a self-motivated individual to join our Team immediately as Incident Analyst (LEVEL III), Computer Security Systems Specialist (Level III) in Arlington, VA. Active DoD Secret Clearance required to start work.

Responsibilities

Design, develop, engineer, and implement solutions to MLS requirements. Perform complex risk analyses which also include risk assessment. Establish and satisfy information assurance and security requirements based upon the analysis of user, policy, regulatory, and resource demands. Support customers at the highest levels in the development and implementation of doctrine and policies. Apply know-how to government and commercial common user systems, as well as to dedicated special purpose systems requiring specialized security features and procedures. Perform analysis, design, and development of security features for system architectures.

Required:

  • DoD Secret Clearance
  • Current DoD 8570.01-M CSWF IAT Level II certification
  • CEH or CND-IR
  • Six to Ten+ years’ experience MLS arena

Experience Requirements:

  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Knowledge of electronic devices (e.g., computer systems/components, access control devices, digital cameras, electronic organizers, hard drives, memory cards, modems, network components, printers, removable storage devices, scanners, telephones, copiers, credit card skimmers, facsimile machines, global positioning systems [GPSs])
  • Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody)
  • Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence)
  • Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Knowledge of types and collection of persistent data
  • Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Skill in using scientific rules and methods to solve problems
  • Knowledge of social dynamics of computer attackers in a global context
  • Knowledge of basic concepts and practices of processing digital forensic data
  • Knowledge of encryption algorithms (e.g., Internet Protocol Security [IPSEC], Advanced Encryption Standard [AES], Generic Routing Encapsulation [GRE], Internet Key Exchange [IKE], Message Digest Algorithm [MD5], Secure Hash Algorithm [SHA], Triple Data Encryption Standard [3DES])
  • Knowledge of data backup, types of backups (e.g., full, incremental), and recovery concepts and tools
  • Knowledge of incident response and handling methodologies
  • Knowledge of operating systems
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)
  • Knowledge of server and client operating systems
  • Knowledge of server diagnostic tools and fault identification techniques
  • Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications
  • Skill in developing, testing, and implementing network infrastructure contingency and recovery plans
  • Skill in performing packet-level analysis using appropriate tools (e.g., Wireshark, tcpdump)
  • Skill in preserving evidence integrity according to standard operating procedures or national standards
  • Knowledge of basic physical computer components and architectures, including the functions of various components and peripherals (e.g., central processing units [CPUs], network interface cards [NICs], data storage)
  • Knowledge of file system implementations (e.g., New Technology File System [NTFS], File Allocation Table [FAT], File Extension [EXT])
  • Knowledge of processes for seizing and preserving digital evidence (e.g., chain of custody)
  • Knowledge of hacking methodologies in Windows or Unix/Linux environment
  • Knowledge of investigative implications of hardware, operating systems, and network technologies
  • Knowledge of legal governance related to admissibility (e.g., Federal Rules of Evidence)
  • Knowledge of processes for collecting, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data
  • Knowledge of types and collection of persistent data
  • Knowledge of webmail collection, searching/analyzing techniques, tools, and cookies
  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files
  • Skill in analyzing memory dumps to extract information
  • Skill in identifying and extracting data of forensic interest in diverse media (i.e., media forensics)
  • Skill in identifying, modifying, and manipulating applicable system components (Windows and/ or Unix/Linux) (e.g., passwords, user accounts, files)
  • Skill in collecting, processing, packaging, transporting, and storing electronic evidence to avoid alteration, loss, physical damage, or destruction of data

PEAKE offers great benefits to employees, including:

  • Pleasant work environment
  • Opportunity for advancement within company
  • Medical/dental/vision insurance for eligible, full-time employees
  • Flexible Paid Time Off (PTO), Holidays and retirement planning for eligible, full-time employees

Employees are hired based solely on PEAKE personnel requirements and the qualifications of each individual candidate. We do not tolerate nor condone discrimination due to age, race, color, religion, sex, national origin or disability. We will comply with the spirit and letter of all local, state and federal laws pertaining to employment. Furthermore, we will not discriminate due to age, race, color, religion, sex, national origin or disability when making decisions regarding termination of employees.

Job Type: Full-time

Send Your Resume

Want to Host a Rally?

Pin It on Pinterest