top of page

System Engineer (Cyber Defense Assistance Program)-Mid-Level 119-013

SysEng.png

See a complete list of our open positions

Apply at the Bottom of the Page

IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community.  We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.  

Some of the positions are future positions.  Please look at the opening line of the job description to determine if this is an open or future position.

 

Our positions are not remote unless stated in the job description below.

We are looking to fill this position at the following location(s):

    Fort Belvoir, VA

Job Description

System Engineer (Cyber Defense Assistance Program)-Mid-Level:



Conducts all-source analytic production of future and current leading-edge technologies and their military applications worldwide. Projects the discovery, development, and deployment of advanced technologies and their potential impact on U.S. forces worldwide. Provides risk assessments on the transfer and diversion of defense and dual-use U.S. technologies and assesses national security implications associated with foreign involvement in critical U.S. defense technology and defense sectors. Produces intelligence for the U.S. National, Defense and Acquisition Communities. Conducts all-source analysis to identify, exploit, and assess potential threats, transfer, and vulnerabilities to defense supply chains.





Mid-Level:


  • Demonstrates working knowledge of the concepts involved in the specific functions outlined in the specified labor category description.

  • Knowledgeable of and demonstrates ability to apply IC and DoD classification guidelines and procedures.

  • Demonstrates ability to use logic and systematic approaches to gather, evaluate, and synthesize multiple sources of information.

  • Demonstrates ability to work semi-independently with oversight and direction.

  • Demonstrates ability to use logic when evaluating and synthesizing multiple sources of information.

  • Demonstrates ability interpreting analysis to include, but is not limited to, its meaning, importance, and implications.

  • Demonstrates ability to defend analytic judgements with sound, logical conclusions and adapt analytic judgments when presented with new information, evolving conditions, or unexpected developments.

  • Demonstrates ability to produce timely, logical, and concise analytic reports, documents, assessments, studies, and briefing materials in formats including Microsoft Office tools (e.g. Excel, Word, PowerPoint, etc.), electronic / soft copy matrices and / or web-enabled formats.

  • Demonstrates ability to communicate complex issues clearly in a concise and organized manner both verbally and non-verbally, with strong grammar skills.

  • Demonstrates proficiency using Microsoft Office tools.

  • Demonstrates ability to develop structured research including, but not limited to, obtaining, evaluating, organizing, and maintaining information within security and data protocols.

  • Demonstrates ability to recognize nuances and resolve contradictions and inconsistencies in information.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to guide teams in researching multifaceted or critical problems.

  • Demonstrates comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for the labor category.

  • Demonstrates the ability to communicate understanding from information that may be incomplete, indirect, highly complex, seemingly unrelated, and / or technically advanced.

  • Demonstrates ability to structure analysis based on trends in reporting and a range of analytic perspectives from other analysts, organizations, and intelligence disciplines.

  • Demonstrates ability to work independently with minimal oversight and direction.

  • Demonstrates ability to collaborate and work with other IC members on information sharing, driving collection, and addressing analytic disputes and conflict resolution.

  • Demonstrates ability to develop concise, insightful, and comprehensive products for defense intelligence.

  • Demonstrates ability to lead teams in researching multifaceted or critical problems. Provides guidance in selecting, designing, and applying analytic methodologies. Uses argument evaluation and validated analytic methodologies to challenge differing perspectives.




Job Responsibilities:


  • Assess computer network defense and information assurance in support of Information Operations and Cyber assessments.

  • Provide certified vulnerability assessment analysts to conduct off-site system vulnerability, network

  • architecture, policy and procedural, application, and system integrity reviews.

  • Provide certified and vulnerability assessment analysts to conduct threat-based emulation and cyber red teaming against Army and Department of Defense networks.

  • Assist with development and maintenance of assessment methods, tools, and techniques.

  • Employ a standardized procedure for vulnerability scan during an assessment.

  • Perform code review in order to find vulnerabilities.

  • Perform protocol and input fuzzing in order to find vulnerabilities.

  • Perform analysis of disassembled code when source code is unavailable.

  • Develop exploits based on identified vulnerabilities.

  • Recommend fixes and mitigation for identified vulnerabilities.

  • Assess Computer Network Defense and Information Assurance in support of Information Operations and Cyber Assessments.

  • Provide certified vulnerability assessment analysts to conduct off-site system vulnerability, network architecture, policy and procedural, application, and system integrity reviews.

  • Provide expertise of network security testing, server hardening, vulnerability scanning tools, and penetration testing techniques.

  • Assist with the creation/maintenance of adversary emulation toolsets/development.

  • Contribute to technical and executive summaries of team assessment missions.

  • Document tactics, techniques & procedures, and develop process map and standard operating procedures for network assistance visit and penetration testing missions.

  • Assist in developing maintaining the Army’s exploitation tool repository.

  • Assist in the integration of exploitation tool testing, evaluation, and documentation (Risk Management Framework Process).

  • Coordinate trends and Tactics, Techniques and Procedures on Army information systems security related matters.




Education and Experience:


  • At least 8 years of experience conducting analysis relevant to the specific labor category with at least a portion of the experience within the last 2 years.

  • Bachelor's degree in an area related to the labor category from a college or university accredited by an agency recognized by the U.S. Department of Education.




Training and Certifications:


  • AIOPC

  • DoD 8570 Information Assurance Technician – Level II

  • Certified Wireless Security Professional (CWSP)

  • Assured Compliance Assessment Solution Certification (ACAS)





Security Clearance:


  • TS SCI

You are applying for the position of 
System Engineer (Cyber Defense Assistance Program)-Mid-Level 119-013
arrow&v
Upload Your Resume
bottom of page