Austin,TX
DatePosted : 3/26/2024 7:16:55 AM
JobNumber : DTS101765696
JobType : Contract
Skills: networking concepts and protocols, and network security methodologies,cybersecurity,cyber threats and vulnerabilities
Job Description
CANDIDATE SKILLS AND QUALIFICATIONS
Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.
Years
Required/Preferred
Experience
2
Required
Knowledge of computer networking concepts and protocols, and network security methodologies.
2
Required
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
2
Required
Knowledge of cyber threats and vulnerabilities.
2
Required
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
2
Required
Knowledge of systems diagnostic tools and fault identification techniques.
2
Required
Knowledge of system administration, network, and operating system hardening techniques.
2
Required
Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
2
Required
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
2
Required
Knowledge of penetration testing principles, tools, and techniques.
2
Required
Knowledge of an organization’s threat environment.
2
Required
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
2
Required
Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
2
Required
Skill in the use of penetration testing tools and techniques.
2
Required
Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.).
2
Required
Skill in conducting application vulnerability assessments.
2
Required
Conduct and/or support authorized penetration testing on enterprise network assets.
2
Required
Prepare audit reports that identify technical and procedural findings, and provide recommended remediation strategies/solutions.
2
Required
Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas.
3
Preferred
Tenable/Nessus administration, operation and vulnerability management.