Computer Security Engineer II

Computer Security Engineer II Job ID 34869 Computer Security Engineer IIDescription:Are you a Computer Security Engineers with experience in computer/network security and forensics to improve and enhance mission-critical software applications?Support the design, analysis, development, configuration, testing, training and securitization of software and computer systems. They will be required to solve challenging technical problems and provide creative solutions to meet mission needs.We are focused on providing our customers expertise in the areas of computer security, information technology, information assurance and computer networking expertise and to create new capabilities. This project provides a unique opportunity to be involved in quick-reaction tasks with opportunities for travel and customer interaction on a team that is focused on developing superior products and encouraging the career growth of its members. QualificationsRequired Qualifications: Must have a Bachelor of Science in Computer Security, Information Technology and Forensics; Computer Engineering, Computer Science or related field Must have a GPA 3.0 or above (out of 4.0 scale) 5+ years of Computer Security experience. Applicants selected for employment will be subject to a federal background investigation and must meet additional eligibility requirements for access to classified information or materials. TS/SCI required. Desired Qualifications: Excellent written and verbal skills. Experience working in a Linux command line environment Network Device Configuration Experience with Managed Switches, Routers and Routing protocols; and network peripherals Working knowledge of Network protocols including http, ftp, ssh, tcp, udp, ip, arp, Ethernet, and 802.11 technologies Experience configuring and administering Backup, Email, Voip, HTTP, and Chat services Experience loading and updating Linux, Windows operating systems on computer hardware or virtualized platforms Working knowledge of Computer/Network Security and Forensics best practices Cisco IOS Experience with CCNA/CCNP Experience setting up software and hardware required for Virtualization technologies (VMWare, Xen, OpenStack, VirtualBox) Working knowledge of Wireshark, wget, netcat, iperf, metasploit, nmap, and Ida Pro applications Working knowledge in penetration testing, intrusion detection systems, firewall configurations, access control lists, and iptables Experience in python, ruby, bash, and perl scripting Experience analyzing performance issues and implementing efficiency improvements Experience with any of the following technologies a plus: Experience with Windows XP/7/8/Server, and MacOS Knowledge of VxWorks, Linux, or other Embedded Systems Experience performing unit testing Experience in C, C++, java, web programming Software design pattern knowledge and object-oriented analysis and design (OOAD) skills Experience with formal testing methodologies (Test Plan and Procedure generation) Strong ability to grasp new technologies and acquire new skills through independent study, professional training, and interaction with other team members Apply Now

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.