Twinn is seeking a Cyber Security Engineer with a project management background also. If that's you come apply!! Know someone.. send them our way!!
REQUIRED SKILLS AND DEMONSTRATED EXPERIENCE
TS/SCI w POLY need to begin work.
• Demonstrated experience transitioning cross-domain services.
• Demonstrated experience with technical exchange meetings with stakeholders.
• Demonstrated experience briefing and writing for technical and non-technical individuals.
• Demonstrated experience with computer and network security, authentication, and cryptography.
• Demonstrated experience identifying possible technical or security problems with technology products and services and providing documented guidance.
• Demonstrated experience performing complex problem management, research and issue resolution.
• Demonstrated experience analyzing network architectures, network topologies, endpoint devices, software applications, cloud-based platforms, and services for technical issues.
• Demonstrated experience with communications protocols, such as IP, TCP, UDP, MPLS, OSPF, IGRP, BGP, SIP, and H.232
• Demonstrated experience with visualization software and visualized environments such as VMWare, Virtual Box, Microsoft Hyper-V, and Quick EMUlator.
• Demonstrated experience with planning, configuring, securing, administering, and maintaining, cloud based technologies, products, and services, such as Amazon Web Services (AWS), Microsoft Azure, Google Cloud, Oracle Cloud, and IBM Cloud.
• Demonstrated experience in a wide range of Radio Frequency (RF) technologies to include terrestrial and space based RF communication, government and commercial satellite systems, commercial cellular and wireless, 5G technologies, and embedded software and firmware development.
• Demonstrated experience with computer and mobile operating systems such as Windows, Linux, Mac OSX, Android, and iOS.
• Demonstrated experience performing digital forensic examination of computers, mobile devices, storage, and memory using commercial or specialty forensic tools such as EnCase, Cellebrite, Autopsy, and Volatility.
• Demonstrated experience with open-source and commercial tools Nmap, Wireshark, Nexpose, Nessus, Nipper Studio, and Snort.
• Demonstrated experience with data extraction from various sources including files, directories, unallocated space, raw images, customer databases.
• Demonstrated experience evaluating hardware and software products against customer requirements for technical evaluation and potential procurement.
• Demonstrated experience with Network Monitoring Appliances.
HIGHLY DESIRED SKILLS AND DEMONSTRATED EXPERIENCE
• Demonstrated experience conducting digital forensic examination of computers, mobile devices, storage, and memory using specialized forensic software.
• Demonstrated experience with cross-organizational missions, technical needs, security architect and information assurance.
• Demonstrated experience with the network review board process.
• Demonstrated experience with network, technical, and acquisition review processes.
• Demonstrated experience with the security policies and IT systems
• Demonstrated experience with Shell-Scripting
• Demonstrated experience with SQL Server, MySQL, and Oracle 10g or 11g
• Demonstrated experience with Microsoft Windows 7, 8, 10, 2008R, 2012, 2012R2, and 2016.
• Demonstrated experience with storage systems including NetApp and HP
• Demonstrated experience with VMWare ESX
• Demonstrated experience with various types of forensic software.
• Demonstrated experience with providing recommendations to architecture and design reviews
• Demonstrated experience with information cyber security policies and regulations
• Demonstrated experience with Intelligence Community Directive (503), Committee on National Security Systems Publications (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, 800-39, and 800-53.
• Demonstrated experience with interfacing with vendors and third party procedures.
• Bachelor’s Degree in Computer or Physical Science, Mathematics, or related technical discipline.
• Certifications: (ISC)2 Certified Information Systems Security Professional (CISSP)
• Certifications: Certified Information Security Manager (CIMS)
• Certifications: Certified Ethical Hacker (White and Gray Hat Disciplines)
• Certifications: Access Data Certified Forensics Examiner (ACE)