Alta Associates is an executive recruiting firm that specializes in
information security.

Our client is a leading provider of information-based systems, integrated
solutions and services, specializing in mission-critical national security
programs for the national intelligence community, the Department of Defense,
and government agencies involved in homeland security.

They are seeking qualified candidates with current top secret clearances,
for key positions within their organization. The positions are based in the
Virginia or Maryland area and compensation ranges from $70,000-$100,000.

They include but are not limited to:

Information Security Officer:
Responsible for reviewing system security plans, and validating that the
plans meet either DCID 6/3 or NISPOM requirements. Validate the plans to
ensure the requirements described by these documents have been met for the
protection level and level of concerns prescribed. Provide timely feedback
to the vendor to correct problems and recommend solutions that mitigate the
risks associated with the system.

Knowledge of DCID 6/3 and NISPOM Chapter 8, May 2000 requirements and the
certification and accreditation process. Ability to review system security
plans, document deficiencies and articulate corrective action to the vendor.
Travel throughout the US to conduct site visits and inspections. Working
knowledge of Windows XP/NT/2000 operating systems and some UNIX/Solaris
would be helpful.

Security Engineer:
Perform network vulnerability analysis and reporting. Perform network
security monitoring and analysis, identify suspicious and malicious
activities, identify and track malicious code (including worms, viruses,
trojan horses, etc), enter and track events and incidents. Support incident
escalation and assess probable impact and damages, identify damage control,
assist in developing course of action and recovery procedures. Knowledge of
LANs, VPNs, Routers, firewalls and other security and network devices.

Forensics Examiner:
Recover, preserve, and analyze digital evidence using standard computer
forensics and evidence handling techniques. Employ forensic tools and
techniques to crack file and system passwords, detect steganography and
recover deleted, fragmented and corrupted data from digital media of all
types. Use forensically sound procedures to identify network computer
intrusion evidence and identify perpetrators. Observe proper evidence
custody and control procedures, document findings in a manner suitable for
courtroom presentation and prepare comprehensive written reports.

Please send your resume with the following information:
Current Salary
Location
Active Top Secret Clearance?

[EMAIL PROTECTED]


Reply via email to