2 days old

Cyber Systems Engineer Technical Specialist

McLean, VA 22101

The customer seeking expertise to assist with investigative efforts, conduct network traffic analysis, support focused network architecture reviews, and assess data pertaining to network intrusions and/or cyber related attacks on equities. Also responsible for analyzing of data on technologies to minimize risks.

The Cyber Security Analyst will serve as a representative of the customer. In this capacity, the Cyber Security Analyst will analyze, investigate and provide in-depth synopses of Customer and various external customer projects and technical initiatives from all disciplines, leveraging the Customer to the fullest extent possible. Additional activities include evaluating technical security and risk assessments, drafting reports and memorandums for senior officers; attending customer meetings, and participating in all Customer activities related to the assignment. The Cyber Security Analyst will also be responsible for drafting Department level reports to inform the Customer organization on how Information Technologies actually work, and the intrinsic vulnerabilities in these Information Technologies; these products will be written for a non-technical audience. In addition, the resource will be expected to -

  • Support internal Customer & External customer activities/projects by providing guidance to ensure the projects comply with Customer's parent organization's policies and regulations while fulfilling the parent organization's operational needs
  • Provide insight into latest threats and countermeasures
  • Collaborate with developers of technologies in acquiring data on systems and importing relevant data into commercial and proprietary databases, enabling analyses.
  • Work with existing IT resources to automate data ingestion to maximum extent possible.
  • Draft and formally present analytical products that will inform Customer decisions on Customer technologies. (Deliverbles shall include written products consisting of tables and graphics as necessary to support the conclusions and/or recommendations to reduce risk, and risk ratings that help readers give appropriate weight to the identified & articulated risks.)
  • Review procurement processes of hardware, software and services to comply with operational needs
  • Provide recommendations for end-to-end technical analysis
  • Data identification, reduction, and analysis to detect suspicious data types, Sponsor tools, modified software and/or other malicious content.
  • Data extraction from various data sources including files, directories, unallocated space, raw images, custom databases (e.g. include parsing of data types necessary to extract metadata and content of forensic value).
  • Data analysis (e.g. forensic and investigative) of raw and extracted data to include processing and interpretation of volatile memory captures and captured images of various electronic devices.
  • System internals level processing to detect and report on significant kernel events such as root kits and kernel level Sponsor tools and communications.
  • Red teaming (e.g. forensic IV&V to enhance Sponsor capabilities through extensive knowledge gained through the detection and analysis of known content.
  • Induction, cataloging, and disposition of evidence.
  • Maintain current knowledge of relevant technology as assigned

Personnel will be sitting at McLean. All personnel coming into the Department undergo an additional security review prior to arrival that may take anywhere from 7 business days to 30 days or more.


Required skills:

  • Customer Experience is required.
  • 10+ years experience and a Bachelor's Degree in Computer Science, Engineering, or a related technical discipline, or the equivalent combination of education, technical certifications or training, or work experience. Five+ years of network/cyber security experience in a secure environment.
  • Demonstrated understanding of Sponsor's Operational Technologies.
  • Demonstrated experience in Certification and Accreditation (C&A), risk assessment methodologies, information security Responsibilities for Management, Internet Security, Portable Electronic Devices vulnerabilities, threat analysis concerns, and other general user information security awareness.
  • Demonstrated experience with commercial databases.
  • Demonstrated experience conducting research and producing professional writings.
  • Demonstrated experience analyzing complex datasets.
  • Demonstrated experience drafting analytical products.
  • Demonstrated experience providing Executive-level briefings.
  • Knowledge of encryption products, methodologies, configuration.
  • Knowledge of Network Packet Capture Appliances/ Applications, such as Netwitness, Solera, Probe, Wireshark, Snort.
  • Knowledge of Network Vulnerability Scanner, Web Scanner, and Database Scanner, such as Nessus, Weblnspect, AppDetective.

Desired skills:

  • Demonstrated experience creating and analyzing policy, and analyzing systems and applications for the Sponsor or Sponsor's partners.
  • Demonstrated experience verifying/validating customer requirements, analyzing processes and job tasks, and developing process improvements.
  • Demonstrated on-the-job experience with programming skills with scripting languages such as Perl, Python, Bash, etc is preferred.
  • Demonstrated on-the-job experience with databases such as Postgres, MySQL, SQLite is preferred
  • Demonstrated on-the-job experience with malware analysis and reverse engineering is highly desired
  • Graduate Degree in Information Technology, Information Security, Cyber Security, or related field.
  • Demonstrated experience communicating technical issues and vulnerabilities in simple terms to Executive Leadership at all levels as a technical writer.
Email this job to a friendRefer
Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed

As a government contractor, Perspecta abides by the following provision
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor's legal duty to furnish information. 41 CFR 60-1.35(c)


  • Information Technology
Posted: 2019-11-10 Expires: 2019-12-09

With offerings in mission services, digital transformation and enterprise operations, our team of 14,000 engineers, analysts, investigators and architects work tirelessly to create innovative solutions. We have the expertise and experience not only to devise solutions, but to execute on them successfully.

Sponsored by:
Farm Credit Services of America Logo
Sponsored by:
Bank of America Logo

Featured Jobs[ View All ]

Featured Employers

Before you go...

Our free job seeker tools include alerts for new jobs, saving your favorites, optimized job matching, and more! Just enter your email below.

Share this job:

Cyber Systems Engineer Technical Specialist

McLean, VA 22101

Join us to start saving your Favorite Jobs!

Sign In Create Account
Powered ByCareerCast