Support PDF,DOC,DOCX,TXT,XLS,WPD,HTM,HTML fils up to 5MB
Years of Experience
Date Last Verified
ProfileCyber Ops Specialist The candidate's duties: Perform internal and external vulnerability assessments as well as penetration; Perform well controlled vulnerability exploitation/penetration testing on applications, network protocols, and databases Perform network reconnaissance; Perform security forensics on systems; Demonstrate advanced understanding of business processes, internal control risk management, IT controls and related standards; Identify and evaluate complex business and technology risks, internal controls which mitigate risks, and related opportunities for internal control improvement; Understand complex business and information technology management processes; Execute advanced services and supervise staff in delivering basic services; Assist in the selection and tailoring of approaches, methods and tools to support service offering or industry projects; Understand clients' business environment and basic risk management approaches; Demonstrate a general knowledge of market trends, competitor activities, Deloitte & Touche products and service lines; Actively participate in decision making with engagement management and seek to understand the broader impact of current decisions; Generate innovative ideas and challenge the status quo; Build and nurture positive working relationships with clients with the intention to exceed client expectations; Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services; Identify opportunities to improve engagement profitability; Participate in and actively support mentoring relationships within practice.
Qualification and Experience
The candidate should have Bachelors and 9+ years of relevant experience. Or Masters and 7+ years of relevant experience. Or PhD or JD degree and 4+ years of relevant experience. Should have advanced knowledge of offensive cyber operations, vulnerability assessments and penetration testing using manual testing techniques, scripts, commercial and open source tools. Experience in exploiting vulnerabilities Ability to read, write and modify scripts. Experience with network reconnaissance and open source intelligence (OSINT) gathering. Experience with OWASP Experience with wireless penetration testing. Experience with password cracking Ability to read and analyze network packet captures. Experience with security forensic analysis Experience with firewall, router, and switch security Knowledge of security best practices: NIST, CIS, Cisco, Juniper, Checkpoint, Microsoft, Unix/Linux, etc. Experience with incident response. Experience with virus analysis, malware analysis and honeypots. Knowledge of security auditing techniques Knowledge of computer control environments. Clearance Level Must Possess: TS/Sensitive Compartmented Information (SCI) with the ability to obtain a Counter Intelligence (CI) Poly; ICAF.