Job Description What You’ll Get to Do:
Responsible for etting up secure systems, network engineering, and has the ability to set up non-traditional internet connections. This individual has expertise in procurement methods including phones, SIMS, and payment mechanisms such as Bitcoin and e-currencies.
You’ll Bring These Qualifications: Proficiency working in a Linux environment – Centos, Ubuntu, Fedora, Solaris, Backtrack. Database experience, to include writing complex queries and modifying schemas SQL 10+ years of experience in a cyber-security role. Must possess an active TS/SCI with required polygraph clearance. Experience configuring network devices (e.g. routers, switches, etc.) Experience performing network packet inspection, traffic analysis, performance characterization (e.g. Wireshark, TCPdump, etc.) Understanding of network/cyber security, penetration testing, and infosec practices. Understanding of Linux network security tools – (e.g. Metasploit, netcat, nmap, etc.) Experience using scripting languages for automation, parsing data sets, and network monitoring (e.g. bash, Perl, Python, etc.) Experience building virtual infrastructure (e.g. vSphere) Experience in either the design, implementation, procurement, tradecraft, or maintenance of various layers within covert network infrastructure. Experience with network and server hardware procurement and detailed record keeping Experience with infrastructure troubleshooting, direct interaction with vendors, svc providers. Experience using industry standards and open source technologies form a 3.5.3 layered security perspective. Experience using Cisco routers to include 2900, 3800, and 3900 families of routers. Experience with Cisco switches to include Catalyst series 3700 & 6500 and Nexus series 3000, 5000, and 7000. Proficient in IPV6. Implementation experience for copper and fiber optic cabling to industry standards with a data center and vertical & horizontal cable plants. Experience designing, engineering, and implementing security networks protocols at layers 1-3; e.g. type-1 cryptography, site to site VPNs, any connect, IL2TP, pVLANS, and authentication. Experience implementing security standards in anticipation of fast pace change of operational tradecraft practices. Working knowledge of Linux (Iptables, RADIUS, DNS, DHCP) with specific implantation of operational tradecraft practices designed to obfuscate protocols and redirect network traffic. Understanding of network logging and monitoring tools such as Cisco Network Analysis Module, Wireshark & Solarwinds. Understanding of end-to-end data flow and applications to include workstation and servers. Understanding of operational tradecraft of dataflow end-to-end and east-west communications within a data center. NSIS.ENG What We Can Offer You: - We’ve been named a Best Place to Work by the Washington Post. - Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. - We offer competitive benefits and learning and development opportunities. - We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities. - For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success. Job Location
CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.