Alta Associates is an executive recruiting firm that specializes in information security.
Our client is a leading provider of information-based systems, integrated solutions and services, specializing in mission-critical national security programs for the national intelligence community, the Department of Defense, and government agencies involved in homeland security. They are seeking qualified candidates with current top secret clearances, for key positions within their organization. The positions are based in the Virginia or Maryland area and compensation ranges from $70,000-$100,000. They include but are not limited to: Information Security Officer: Responsible for reviewing system security plans, and validating that the plans meet either DCID 6/3 or NISPOM requirements. Validate the plans to ensure the requirements described by these documents have been met for the protection level and level of concerns prescribed. Provide timely feedback to the vendor to correct problems and recommend solutions that mitigate the risks associated with the system. Knowledge of DCID 6/3 and NISPOM Chapter 8, May 2000 requirements and the certification and accreditation process. Ability to review system security plans, document deficiencies and articulate corrective action to the vendor. Travel throughout the US to conduct site visits and inspections. Working knowledge of Windows XP/NT/2000 operating systems and some UNIX/Solaris would be helpful. Security Engineer: Perform network vulnerability analysis and reporting. Perform network security monitoring and analysis, identify suspicious and malicious activities, identify and track malicious code (including worms, viruses, trojan horses, etc), enter and track events and incidents. Support incident escalation and assess probable impact and damages, identify damage control, assist in developing course of action and recovery procedures. Knowledge of LANs, VPNs, Routers, firewalls and other security and network devices. Forensics Examiner: Recover, preserve, and analyze digital evidence using standard computer forensics and evidence handling techniques. Employ forensic tools and techniques to crack file and system passwords, detect steganography and recover deleted, fragmented and corrupted data from digital media of all types. Use forensically sound procedures to identify network computer intrusion evidence and identify perpetrators. Observe proper evidence custody and control procedures, document findings in a manner suitable for courtroom presentation and prepare comprehensive written reports. Please send your resume with the following information: Current Salary Location Active Top Secret Clearance? [EMAIL PROTECTED]
