Alta Associates is an executive recruiting firm that specializes in 
information security.

Our client is a leading provider of information-based systems, integrated 
solutions and services, specializing in mission-critical national security 
programs for the national intelligence community, the Department of 
Defense, and government agencies involved in homeland security.

They are seeking qualified candidates with current top secret clearances, 
for key positions within their organization. The positions are based in 
the Virginia or Maryland area and compensation ranges from $70,000-
$100,000. 

They include but are not limited to:

Information Security Officer:
Responsible for reviewing system security plans, and validating that the 
plans meet either DCID 6/3 or NISPOM requirements. Validate the plans to 
ensure the requirements described by these documents have been met for the 
protection level and level of concerns prescribed. Provide timely feedback 
to the vendor to correct problems and recommend solutions that mitigate 
the risks associated with the system. 

Knowledge of DCID 6/3 and NISPOM Chapter 8, May 2000 requirements and the 
certification and accreditation process. Ability to review system security 
plans, document deficiencies and articulate corrective action to the 
vendor. Travel throughout the US to conduct site visits and inspections. 
Working knowledge of Windows XP/NT/2000 operating systems and some 
UNIX/Solaris would be helpful.
 

Security Engineer:
Perform network vulnerability analysis and reporting. Perform network 
security monitoring and analysis, identify suspicious and malicious 
activities, identify and track malicious code (including worms, viruses, 
trojan horses, etc), enter and track events and incidents. Support 
incident escalation and assess probable impact and damages, identify 
damage control, assist in developing course of action and recovery 
procedures. Knowledge of LANs, VPNs, Routers, firewalls and other security 
and network devices.
 

Forensics Examiner:
Recover, preserve, and analyze digital evidence using standard computer 
forensics and evidence handling techniques. Employ forensic tools and 
techniques to crack file and system passwords, detect steganography and 
recover deleted, fragmented and corrupted data from digital media of all 
types. Use forensically sound procedures to identify network computer 
intrusion evidence and identify perpetrators. Observe proper evidence 
custody and control procedures, document findings in a manner suitable for 
courtroom presentation and prepare comprehensive written reports. 

Please send your resume with the following information:

Current Salary
Location
Active Top Secret Clearance?

[EMAIL PROTECTED]

Reply via email to