Logo
Northwood Mortgage Ltd.

Cyber Engineer II

Northwood Mortgage Ltd., Dulles, Virginia, United States,


Career Opportunities with Novel Applications of Vital InformationA great place to work.Careers At Novel Applications of Vital Information, IncJoin the Novel Applications Family:At Novel Application, we’re focused on finding and keeping top talent. We are looking for highly motivated and experienced personnel who are willing to learn and share that knowledge with fellow employees. We believe that together we can solve any challenge that faces our customers.Novel Applications is an equal opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, or national origin.*All applicants must be a US Citizen.Residency Status:

ALL Candidates Must Be A U.S. CitizenClearance:

Candidates

Must

have an

Active

Secret clearance and the ability to obtain a TS/SCI security clearance.Clearance Notice:

*Candidates without the required clearance will NOT be considered for this position.*Time Type:

Full-Time, Daytime Schedule - RemoteRelocation Fees:

NoCompany Overview:NAOVI is a premier technology services company that provides solutions in the areas of Cyber Security, Information Management and Systems Integration. NAOVI combines experience, creativity, flexibility, pragmatism, and cost-effective solutions to deliver measurable business value to our clients.Headquartered in Fredericksburg, Virginia, NAOVI employs engineers, analysts, IT specialists and other professionals who strive to be the best at everything they do.Novel Applications of Vital, Inc. (NAOVI) is an AA/EEO Employer Minorities/Women/Veterans/Disabled.Job DescriptionNAOVI is seeking a Cyber Engineer to design, develop, document, analyze, test, integrate, debug, conduct research and/or discover and analyze security flaws or vulnerabilities in software, networks, systems, and applications. The Cyber Engineer ensures system security needs are established and maintained for various objects/matters.Primary responsibilities:Analyze output from various security devices and malware and incident reports to improve detection of and to minimize future incidents.Assess and analyze system security to identify and mitigate risks and vulnerabilities.Recommend countermeasures to mitigate risks and vulnerabilities.Assist in identifying, prioritizing, and coordinating the protection of critical cybersecurity infrastructure and key resources.Perform basic system design functions, including interpretive analyses, chart preparation and associated diagrams/enhancement plans.Test existing and new technologies.Review/analyze requested changes for equipment, technology and/or other factors/trends, which are planned for deployment in the customer space.Support the configuration and administration of cyber security tools and systems.Required Skills:Must have an active Secret clearance and be able to obtain a TS/SCI clearance.Must be able to obtain DHS Suitability.2+ years of applicable experience in cyber security.Experience with commercial cyber tools and technologies.Experience with standard security principles, policies, standards and industry best practices.Experience and knowledge of networking (TCP/IP, topology, sockets and security) and web technologies (Internet security).Experience or knowledge of intrusion detection and prevention systems (IDS/IPS), log analysis, malware analysis, network traffic flow and packet analysis.Understanding and ideally experience with Windows or Linux/Unix operating systems.Possesses or quickly develops an understanding of Government Information Security policies, regulations, and guidelines.Desired Skills:Experience with Security Event Incident Management (SEIM), Log Correlation and Network Behavior Anomaly detection systems.Experience and/or familiarity with development languages such as: Java, Swing, JUnit, Perl, Python, HTML.Demonstrated experience and/or familiarity with VMware and virtual machines.Ability to write custom tools and modify existing intrusion detection tools.Experience with Agile development methodology.Experience with automated testing tools.Experience with one or more of the following:Security COTS integrationSecurity Incident Event ManagementInsider Threat MonitoringOperating System HardeningVulnerability Assessment testingIdentification and Authentication schemesPublic Key Infrastructure and Identity ManagementCross Domain SolutionsComputer Network Exploitation (CNE)Computer Network Operations (CNO)Malware AnalysisReverse Software EngineeringSecurity engineering.Required Education:Bachelor’s degree in Cyber Security, Information Security, Software Engineering or a related discipline is required. [Four (4) years of experience (for a total of six (6) or more years) may be substituted for a degree.]

#J-18808-Ljbffr