Quantum Technologies Inc. Huntsville, AL 35806, USA
Jul 01, 2019Full time
Quantum Research International, Inc. (Quantum) is a certified DoD Contractor providing services and products to US/Allied governments and industry in the following main areas: (1) Cyber Security/Intelligence Programs Support; (2) Command, Control, Communication, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR); (3) Space Operations and Control; (4); Warfighter Support and Logistics; (5) Weapon System Analysis; (6) Acquisition Support; (7); Test and Evaluation; and (8) Audio/Visual Technology Applications. Quantum’s Corporate Office is located in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation’s Warfighters. In addition to our corporate office, we have physical locations in Arlington VA; Hampton Roads, VA; Bel Air MD; Colorado Springs, CO; and Shalimar, FL. Mission: Quantum is currently seeking highly qualified individuals to provide support as Cyber Security Analysts in Huntsville, AL. in the areas of: Penetration Testing, Incident Response, Digital Forensics, Disaster Recovery and Subject Matter Experts. Individuals with experience in any of these areas are encouraged to apply to this announcement. Roles/ Responsibilities: Penetration Testing: Conduct internal and external vulnerability assessments, code reviews and penetration tests against Windows and Linux environments, cloud architecture, IoT devices, general networking devices/peripherals, and web/mobile applications (e.g. SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, and Clickjacking). Incident Response: Responsible for Incident Handling and Response to include incident triage, response, data collection, investigation, analysis and assist the customer with remediation. Knowledgable of Intrusion Detection\ Prevention Systems events, network and host forensic analysis, log review and correlation, pcap analysis, anti-virus software and common operating systems (Linux/UNIX and Windows). Forensics: Participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un-packers, virtual machines, and network sniffers. Using forensic tools (e.g., EnCase, Forensic Toolkit, Autopsy) and investigative methods to analyze digital media (logs, code, hard drives, memory dumps, etc.) to determine attack methods, threats and develop mitigation techniques. Iidentify electronic data associated with cyber incidents to include; Internet use history, documents, images and other files that have been hidden, deleted or lost. Disaster Recovery: Responsible for preparing contingency plans for system software, hardware, and applications for the organization. Implements procedures to ensure business applications continue to function through disruptive incidents within an organization. Develops and maintains various security controls to protect technology assets from internal or inadvertent modification, disclosure or destruction . Subject Matter Experts: Utilizes functional area expertise gained through direct industry experience to generate functional area strategies for enhanced cybersecurity operations in a cross-functional area mode throughout the organization. Participates in strategy sessions, strategic assessments and design reviews to validate enterprise approach. Provides guidance and direction to other cybersecurity professionals, acts in a consulting and/or advisory capacity; coordinates resolution of highly complex problems and tasks; and possesses ability to meet and operate under deadlines. Requirements: Bachelor’s Degree in a technical discipline desired, but years of experience and certifications may be accepted in lieu of Degree. Previous experience providing Cyber support. Applicable Certifications include any of the following: CISSP, CISA, CEH, PenTest +, CySA+, OSCP, A+ CE, CCNA, Security+, Network+, and SANS (GSEC, SANS GCIA, or SANS GCIH) Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.