Cyber security jobs in India and Abroad

Job Description for Penetration testing / Security Analyst

Name of the Organization :
Location : Hyderabad
Designation / Level : Ethical Hacking Analyst
Experience : 0 - 2 Yrs
Salary : Rs. 120,000 - 150,000 p.a.
pls email your cv to : ten.sbaleulav|alrehcidok.htnameh#ten.sbaleulav|alrehcidok.htnameh/moc.snoitulosdnimartceps|rh#moc.snoitulosdnimartceps|rh

Job Description for Cyber Forensic Analyst

Name of the Organization : Mandamus Info Knowledge Consultants (Bangalore) Pvt. Ltd.

Brief about the Company :
Mandamus is a leading organization in India providing “Cyber Fraud Management Services”, “Information Security” and “compliance audits” to government bodies, law enforcement agencies, corporate bodies and individuals.
Mandamus offers expert services in:
• Setting up state of the art Cyber Forensics Investigation Centers
• Cyber Forensics Product Sales
• Cyber Forensics Investigation Services
• Cyber law and Cyber Forensics Training
• Information Systems Audit
• Information Security Risk Analysis and Assessment
Mandamus is also the Master franchisee of KEONICS Cyber Lab an initiative by the Department of IT, BT and S & T, Government of Karnataka, implemented by Karnataka State Electronics Development Corporation Limited a Government of Karnataka Enterprise.
The Cyber Lab – Mangalore is a capacity building unit for Law enforcement, Legal Authorities, Banking, Corporate, Academia and this will also be a Research and Development Unit for the Law Enforcement.

Location : Mangalore / Bangalore
Designation / Level : Cyber Forensic Analyst
Experience : 0 - 2 Yrs

Salary : Rs. 120,000 - 150,000 p.a.

Job Function : Cyber Crime Analysis, Teaching, Education and Research
Education and Experience
 B.E/B.Tech/B.Sc Computers or M Tech/MCA or any equivalent professional qualification.
 0-2 years of experience in working with digital forensic tools, methodologies and protocols.
 Possession of professional certifications like EnCase, CFCE, CCFE, CHFI and membership in professional associations is highly desirable.
 Functional experience conducting forensic acquisitions and examinations on a variety of platforms, operating systems and file systems including:
Windows® (FAT & NTFS), Macintosh® (HFS+), Linux® (EXT2/3), and mobile devices.
 Basic/Expert level knowledge of forensic software and hardware tools including EnCase®, Access Data, FTK®, Cyber Check Suite and various Open Source Tools.
 Class room Training Experience.

Roles & Responsibilities
 Responsible for providing digital forensic investigation support including preservation, authentication, examination, and documentation of electronic evidence.
 Conduct forensic acquisitions and imaging of digital evidence both locally and on-site (Crime Scene or Judicial Court)
 Conduct complex, large-scale forensic examinations and analysis of electronic evidence across a variety of media including workstations, laptops, servers, iPads and cell phones.
 Provide reports and testimony on examination findings.
 Deliver presentation and Training programs to various groups like Law Enforcement, Legal Fraternity, Government Staff, Academia and People.
 Deliver and design courses and develop course material.
 Revise amend and/or update training materials to ensure the effective training standards to be maintained.
 Training peer group on forensic protocols for evidence preservation and production.

Key Competencies
 Excellent written and verbal communication skills
 Formal presentation skills required
 Team Player
 Problem analysis and Problem-solving
 Strong project management skills with the ability to multi-task
 Flexible for Shifts and Travel.

Interested candidates can send their profile to ni.sumadnam|rh#ni.sumadnam|rh / ni.sumadnam|nahsik#ni.sumadnam|nahsik / ni.sumadnam|ihdinirs#ni.sumadnam|ihdinirs

Contact Address:
Mandamus Info Knowledge Consultants (Bangalore) Pvt. Ltd.
#36/36, 1st Floor, 5th Block, Rajajinagar,
Bangalore – 560 010

Phone Number: +91 80 42200612 / 613 / 614 / 615

Senior Corporate Investigator

Location: Seattle Area
Categories: Investigations, Loss Prevention
Position Purpose

The Senior Corporate Investigator is responsible for conducting investigations and managing & supporting the company’s overall programs, systems and policies designed to identify and investigate incidents of theft, fraud and other criminal or dishonest activity.

Essential Duties and Responsibilities

• Perform as senior investigator for Coinstar, Inc. and primary investigator for the Coin line of business and New Ventures – as well as company and corporate liaison for law enforcement agencies.

• Prepare and deliver pro-active briefings and investigation reports to management as appropriate.

• Perform as a company subject-matter expert in the prevention, identification and investigation of corporate fraud.

• Effectively partner with the HR, legal, finance, internal audit and operations departments in the conducting of investigations and defining/implementing loss prevention programs.

• Support Loss Prevention Director in efforts to establish, implement, and monitor policies, standards, procedures and systems for the conduct of investigations throughout the company.

• Develop and conduct training of personnel throughout the company who support investigative needs or perform investigative roles.

• Support Loss Prevention Director and Manager LP in the identification & design of business requirements for transaction analysis, data mining and exception reporting systems necessary to identify incidents of theft and fraud.

• Support and coordinate loss exposure analysis efforts with loss prevention, internal audit, finance, legal and other departments as appropriate.

• Direct, monitor and manage investigations or investigation support services of subordinate corporate staff, loss prevention partners or contract investigators.

• Ensure completeness and proper administration of corporate incident reporting and case management records and related systems.

Preferable Qualifications & Experience

• 7-10 years of experience in the conduct and management of theft and complex business fraud investigations from initiation through trial/prosecution, including at least five (5) years in a corporate environment

• Bachelor’s degree in Criminal Justice, Economic Crime, Accounting or a related field

• Certified Forensic Interviewer (CFI) required

• Successfully completed the basic and advanced interview and interrogation courses by Wicklander-Zulawski, Reid or the equivalent

• Knowledge or training in LSI/SCAN techniques

• Strong current work experience in the conducting of interviews and interrogations

• Broad general knowledge of economic fraud, theft and crimes commonly experienced by businesses in cash/currency handling, retail and ecommerce to include common methodologies of perpetration, prevention and detection

• Successful experience in directing the work of analyst/developers in use of data mining tools and exception reporting systems specific to theft/ fraud activity • Proficiency in Microsoft products including Word, Excel (including pivot tables & macros), Outlook, and PowerPoint

• General familiarity with SQL or SQL concepts for data analysis

• Professional affiliations preferred: Certified Fraud Examiner (CFE), Certified Protection Professional (CPP), ASIS Member

• Professional training in workplace violence investigations, risk/threat analysis and intelligence analysis

• Experience in developing and presenting objective-based adult training curricula and programs, including effective use of instructional media

The position does not pay for relocation and is based in Bellevue, WA.

Security Architect - Bangalore

Position Description:
Work as a part of a Jamcracker team to provide comprehensive security insight into the architecture, design and development of Jamcracker platform for enabling and providing On Demand Solutions. The position will also be responsible for evaluating emerging technologies and standards with respect to security primarily and their applicability to Jamcracker platform. The person will play key role in different technical discussions with customers / partners and will part of team responsible for providing security and technical as well as strategic direction to Jamcracker products.

Position Type: Full-time, Regular

Position Requirements:
• Be able to architect, design and implement solution using J2EE technologies. Be conversant with Microsoft .net, Perl, Php technologies.
• Be an active member of various Software Standard organizations and be a regular contributor to technical journals primarily focused on security aspects of web based products.
• Interest in latest technology trends in the industry and drive a new innovation into engineering
• Excellent writing and communications skills.
• Deep understanding of services oriented architecture and Web Services and REST APIs.
• Be proficient with Web vulnerability assessment and solutions and experience in PCI compliance based applications.
• Be single point of contact on all security aspects of Jamcracker platform.
• Be able to provide security/technology insights and assessment of appropriate third party products.
• Works extensively with the Product management and individual project teams to collaborate and educate them on security principles, software engineering, J2EE best practices, System consideration and team collaboration
• Be able to work with internal and external clients in an onsite- offshore environment;
• Provide guidance for resolving Performance, Scalability and reliability related bottlenecks in the software product.
• Must be excellent problem solver , creative thinker , and self- motivated.

Technical Skills:
• 14+ years of experience in software industry experience in building large, diverse and/or complex distributed technologies. At least 5 years of this, should be related to security assessment and implementation of web based products.
• Successful track record with ability to design and develop J2EE compliant enterprise applications that are robust, complex, scalable and use advanced J2EE technologies (i.e. JNDI, JDBC, JMS, EJB, Servlet, JSP, XML, SOAP, REST API, )
• Experience in cryptography, certificates, certificate chaining, SSL, encryption algorithms, SAML, XACML, JAAS, 2-factor authentication etc. technologies.
• Have experience with Identity management tools such as SiteMinder, Ping Identity, and Oracle IAM etc.
• Experience in implementing OWASP principles for application vulnerability and ethical hacking.
• Experience in designing product for scalability, performance and enable efficient and flexible deployment, upgrade, and support processes.
• 8+ years experience with J2EE technology in enterprise software development with full understanding life-cycle development process, methodology and tools.
• Deep knowledge and working experience with application server, relational databases and O/R mapping technologies.
• Experience in building applications integration frameworks and good understanding of On Demand Computing / Software as service paradigm.
• Strong self-initiative to strive for both personal and technical excellence.

Technical Skills – Nice to have:
• Experience in implementing the architecture as well as identifying infrastructure needs for I18n / localization.
• Experience in Cloud computing and Virtualization Educational Requirements:
Bachelor's degree in Computer Science, Math or Engineering; MS in Computer Science, Math or Engineering is preferred.

Pls send cv's to moc.snoitulosdnimartceps|rh#moc.snoitulosdnimartceps|rh

IT Security Professionals Needed - Work from Home.

Company Expanding Need Subject Matter Experts (SME’s) for: Microsoft, CISCO, and CompTIA.

These are part time, work from home positions. Lucrative pay to write course material and Practice Exam Questions.

Please send your resume with experience and contact info to:


Company : Dupont

Designation Web Security Specialist
Job Description

Primary Function: Primary responsibility will be to perform web-based application

vulnerability tests and provide risk mitigation recommendations to the application / asset

owner for vulnerabilities identified within those applications.

Interfacing with other DISO and DuPont business people to expand the service

Web-based application vulnerability tests and technical security evaluations.

Candidate will be responsible for performing various security assessments, and providing

meaningful hardening and mitigation strategies.

Conduct web-based application vulnerability tests.

Presenting scanning results

Desired Profile


At least 2 years of experience working in SOC/NOC environment

Experience with IBM Rational AppScan Web application testing tools.

Familiarity with other penetration testing tools such as Nessus, nmap, MetaSpolit, tcpdump,


Excellent interpersonal and oral and written communication skills

Experience 2 - 5 Years

Company : Dupont

Designation Vulnerability Analyst / GIT

Job Description

Primary Function: Primary responsibility will be to perform periodic vulnerability

assessments and provide assistance with results analysis

Assume responsibilities of day to day of Qualys Scanning Hardware including:

o Ensuring the scan approach is consistent and methodical.

o Ensuring scan coverage covers as much of the enterprise as possible.

o Account Management: Account Set Up Account Analysis and Clean Up, Annual Entitlement

review, User Profile Requests.

o Assets & Groups: Add new assets, QIP verification, Clean-up ,

o Search Lists & Option Profiles: Maintain, create and remove search lists as needed.

o Scanners: Ensure Scanners are operational and fully functioning. Scanner and deployment is

optimized, RMA Obsolete or Broken Scanners, Maintain Spare Scanners for Acquisition Support

or Back-up purposes, Installation coordination, Maintain Set Up Guides.

o Host and Domain Assets: Maintain Create and Remove. Authentication Records: maintain,

create and Remove , Update credentials, Assist in Automation,

o Problem Resolution: Management and Troubleshooting.

o Scan Cycle: Manage ad hoc scanning, weekly and monthly scan schedules, maintain schedules,

adjust and tune scan schedule timing.

o End-user support

o Audit Support

o New feature support & Implementation

o Manage Alternative Solutions as required
Desired Profile


At least 2 years of experience working in SOC/NOC environment

Hands on knowledge of Quays Vulnerability Scanner.

Candidates should have at least two years of experience working in SOC/NOC environment.

Experience in vulnerability analysis and management, monitoring of Intrusion detection

systems (IDS/IPS), Firewalls, VPN, and other security products.

Good networking concepts and understanding of TCP/IP

Experience 2 - 5 Years

Company :Delloitte , Hyderabad

Designation Vulnerability Management - Manager / Executive Manager
Job Description

At Deloitte we give you room to grow.� Choice is just one way we support advancement and

with multiple service lines, industries and specialties we give you more options to extend

your career within the organization.� As one of the world's leading professional services

firms, we provide consulting and advisory services to over 120,000 people in 150 countries.

Through highly talented advisory and consulting professionals, Deloitte US Firms deliver

deep intellectual capital across all of our service areas bringing high value solutions to

meet our clients' business objectives and increase shareholder value. We are known for

innovative human resources programs and our dedication to assist our clients and our people

to excel.

Business models today encourage, and even require, opening boundaries between customers,

suppliers, and partners. Technology can enable that openness and is also seen as a means to

help achieve compliance with corporate policy and regulation. However, behind this increased

accessibility and reliance on technology exists real risks and challenges.� Technology can

support compliance efforts, act as a business enabler, and provide a foundation to achieving

secure systems.� Meanwhile complex network environments, global operations, and human beings

often challenge an organization's security efforts. The increasing occurrence and complexity

of security threats indicate that security has become a business imperative. Managing

information risk at the enterprise level enables companies to achieve more efficient and

effective security processes and programs. Issues such as stakeholder value, consumer

confidence, brand and reputation protection, and legal and regulatory compliance can be


Digital information security is a management issue with global business implications. To

succeed in today's network economy requires more than simply a focus on IT issues - it also

requires a focus on security strategy and management.� Deloitte & Touche provides Security

Services that address how to take advantage of this dynamic situation while managing risks

and are based on an enterprise-wide approach that focuses on security through seven areas:��

��Application Integrity

��Business Continuity Management

��Identity & Access Management

��Infrastructure & Operations Security

��Privacy & Data Protection

��Security Management

��Vulnerability Management
Desired Profile

Experience in information security & controls

Should have played a lead role in a client engagements (Global exposure)

Exposure to methodologies such as OWASP preferred

Information Security Audit

Penetration Testing-Network, Host, Applications (Ethical Hacking)

Vulnerability Assessments-Network, Host, Applications

Security in SDLC (Application Security)

Enterprise IDS Implementation and Testing

Operating System and Application Hardening

Incident Response Training

Information Security Education

System security and controls including:

Firewall design and implementation (NOT Administration)

Encryption technology design and Implementation

Network configuration and administration

Security auditing techniques

Key Job Responsibilities


Demonstrate advanced understanding of business processes, internal control risk management,

IT controls and related standards

Identify and evaluate complex business and technology risks, internal controls which

mitigate risks, and related opportunities for internal control improvement

Demonstrate Infrastructure Security design and implementation skills on Client IT

environment like experience of SIEM (Security incident event Management), Encryption

technology solution design and


Understand Threat and Vulnerability Management at enterprise level, facilitate use of

technology-based tools or methodologies to review, design and/or implement products and


Understand complex business and information technology management processes.


Execute advanced services and supervise staff in delivering basic services


Assist in the selection and tailoring of approaches, methods and tools to support service

offering or industry projects

Understand clients' business environment and basic risk management approaches

Demonstrate a general knowledge of market trends, competitor activities, Deloitte & Touche

products and service lines

QA deliverables from the team and be the single point of contact for all Project delivery

with the client.

Actively participate in decision making with engagement management and seek to understand

the broader impact of current decisions

Generate innovative ideas and challenge the status quo

Build and nurture positive working relationships with clients with the intention to exceed

client expectations

Identify opportunities to improve engagement profitability. Participate in and actively

support mentoring relationships within practice Excellent potential for

1) playing lead role in designated tasks of the project team in gathering, organizing and

analyzing data;

2) making major contributions in assuring products/deliverables meet contract/work plan and;

3) strong potential for growth and acceptance of additional responsibilities.
Experience 1 - 3 Years

COmpany : UHG ,hyd


2 - 5 Years

Hyderabad / Secunderabad

UG - Any Graduate PG - Any PG Course
Industry Type:

Pharma/ Biotech/Clinical Research

Security Engnr
Functional Area:

IT-Support, Telecom, Hardware
Posted Date:

28 May
Desired Candidate Profile

Candidates will possess:

- GIAC Security Administration Intro

- ITIL Foundation exposure

Additional Job Information:

May participate in a small range of incidents or projects, generally smaller in scope, scale

and complexity

- Good spoken & written skills

- Solid organizational skills

- Solid interpersonal skills

- Demonstrated ability to deliver quality detail level work.

- Ability to work independently with minimal direction

- Proficient in using Microsoft:

- Word

- Excel

- Visio

Familiar in using Microsoft:

- PowerPoint

- Familiar with incident management tools and methodology

Location: Hyderabad
Job Description

- Uses pertinent data and facts to identify and solve a range of problems within area of


- Investigates non-standard requests and problems, with some assistance from others.

- Works exclusively within a specific knowledge area .

- Prioritizes and organizes own work to meet deadlines.

- Provides explanations and information to others on topics within area of expertise

- Support security/privacy program

- Responsible for incident handling

- Track and Publish reports

- Administer incident handling work intake methods

- Other program duties as required

- Participate in the development of Security quality assurance plans

- Maintain and distribute Security Metrics reporting

Infrsatructure support people wanted

(Min 2+yrs)

  1. Level 1.5 Service Desk Analysts
  2. Remote Desktop Analysts
  3. Asset Managers
  4. Change Managers
  5. Knowledge Managers
  6. Service Desk Team Leaders
  7. Incident Managers

Location : Kolkatta

E-mail: moc.losyrc|atij#moc.losyrc|atij / moc.snoitulosdnimartceps|rh#moc.snoitulosdnimartceps|rh

Pls email cv to moc.snoitulosdnimartceps|rh#moc.snoitulosdnimartceps|rh

IDBRT,Hyderabad require Security specialists

1. Wanted few people to work from bangalore or hyderabad , with CCNP CCIE type of experience.
Only real time experience candidates required.this is for a technical support company for level 1/2/3 support.

2. Wanted Network Security testers -for a new start up company

pls send cv's if any moc.snoitulosdnimartceps|rh#moc.snoitulosdnimartceps|rh

Position Title Cyber Security Operator
Clearance Required Yes - Final Required to Start
Clearance Type Secret
Daily Responsibilities Monitoring Analysts are primarily responsible for second and third level event monitoring support. They also monitor resources such as ArcSight, Foundstone, data feeds of alerts and logs from firewalls, routers, other network devices or hosts, data feeds and/or alerts from ISS, SourceFire and other host and network based IDS/IPS to watch for security violations and determine vulnerabilities. In addition to the skills required of a Level I/II Monitoring Security Analyst, a Level III Monitoring Security Analyst must have more advanced security monitoring skills and a more advanced understanding of network/host vulnerabilities and exploits, hacker methodology, host/network device hardening techniques, and security incident prevention/mitigation techniques and be responsible for the mentoring and ongoing continuous skill improvement of the Level I/II Monitoring Security Analysts on his or her watch. This position is to fill an overnight shift role; however, employees may, during their assignment to the engagement, work another shift on a temporary or permanent basis depending on the needs of the engagement and the availability of the employee.
Daily Responsibilities Continued •Reports directly to the Senior Security/Incident Response Engineer of his/her assigned watch.
•The primary duty of the Level III Monitoring Security Analyst is the monitoring of the network for security incidents, discovery of vulnerable systems, and taking actions to prevent or mitigate security incidents to ensure 100 % availability, reliability, and the integrity of the customer’s network and the associated services and resources. This duty takes precedence over all other activities.
•Provide third level security monitoring and event/alert and incident evaluation and determination assistance on issues escalated by Level I/II Monitoring Security Analysts.
•Mentors and helps provide direction and on the job training to Level I/II Monitoring Security Analysts.
•Assisting Level I/II Monitoring Security Analysts with and responsible for providing real-time security monitoring and incident reporting of the customer’s network and IT infrastructure.
•Escalation to Security Engineers/Incident response Engineers and Senior Security/Incident Response Engineer outages and possible security incidents and vulnerabilities.
•May be tasked with assisting in security incident mitigation and resolution.
•Performs unobtrusive FBI/SANS Top 20, CVE, etc. vulnerability scans in accordance with customer directives at the direction of Senior Security/Incident Response Engineer.
•Performs unobtrusive vulnerability scans in response to and part of the investigation of suspicious network activity – ONLY after receiving authorization to do so by Senior Security/Incident Response Engineer.
•Make recommendations for tuning of host and network-based IDS/IPS and other security devices.
•Assists in the customer-CCB approved tuning of IDS/IPS and other security devices under the direction of the Senior Security Engineer or Senior Security/Incident Response Engineer.
•Checks hourly the status of monitoring tools and IDS/IPS reporting – provides hourly security status to Senior Security/Incident Response Engineer for inclusion into the Shift Reports.
•Answers SOC incoming phone calls.
•Based on the problem isolation described above, generate trouble tickets with supporting organizations (e.g. Help Desk or Network Support)
•Provide on-going trouble ticket status to Senior Security/Incident Response Engineer and/or Senior Engineer for forwarding to security management and the Call.
•Reports on daily activities and assigned task status to Senior Security/Incident Response Engineer for incorporation into Shift Report.

Required: Years of experience (min) 1-2
Required: Degree None
Required: Basic Qualifications One year plus or more of previous experience in security event/alert monitoring employed in a SOC, CSIRT, or on a Security Response Team employed in the capacity as a Level I/II Analyst. A more advanced understanding of host/network common vulnerabilities and exploits (CVEs), hacker methodologies and tactics, and the tools used.
Must have the ability to work shift. The shift is determined at the time of hire based on requirements.
Desired: Degree Bachelors
Desired: Skills Chain of Custody and basic security incident evidence gathering.
TCP/IP protocol suite, TCP/IP headers and packets, the OSI model, and commonly used TCP/UDP ports and associated services.
Common OS and domain structures (WindowsNT, 2000 Active Directory, etc.), servers, services, and associated vulnerabilities
Experience using Security Incident Event Management tools; practical experience using ArcSight SEIM in a client environment is preferred.
Use of tools such as Trace Route, Visual Route, Ethereal, Nessus, know how to do packet captures, TCPDumps and the use and function of other commonly used security tools.
Monitoring and the analysis of Firewall logs, router syslogs, and network/host-based Intrusion Detection/ Prevention systems (IDS/IPS). Experience with the tuning of IDS/IPS, firewall ACL’s and rule sets.
Network engineering and local and wide area (LAN/WAN) technologies and topologies. An understanding of routing protocols, switching, etc.
Host platform vulnerability assessment and hardening standards and methodologies.
Linux, Red Hat, etc. hosts, operating systems, and applications.
Ticketing systems such as Peregrine, Remedy, etc.
Preferably IT Security/Information Assurance training through such sources as SANS, etc.
Desired: Subject Computer Science or Information Assurance

We are seeking Senior Network Engineers to join our team of qualified individuals at Hanscom, AFB in Boston to support the Engineering and Technical Acquisition System Support (ETASS) contract for the Air Force’s Electronic Systems Center (ESC). The selected candidates will support ESC’s Cyber/Netcentric Directorate in providing full life cycle systems and specialty engineering to successfully assist ESC in the execution and support of their programs. Specific activities will include support of a large delivery order providing 1) network security, network management and network defense for the Air Force’s intra/internet; 2) high speed fiber backbone networks at all fixed Air Force bases worldwide; and 3)network support, asset management, test and evaluation support and security support .

Roles and Responsibilities:

Designs and plans network communications systems.
Provides specifications and detailed schematics for network architecture.
Provides specific detailed information for hardware and software selection, implementation techniques and tools for the most efficient solution to meet business needs, including present and future capacity requirements.
Conducts testing of network design.
Maintains technical expertise in all areas of network and computer hardware and software interconnection and interfacing, such as routers, multiplexers, firewalls, hubs, bridges, gateways, etc.
Evaluates and reports on new communications technologies to enhance capabilities of the network.
Applies extensive technical expertise, and has full knowledge of other related disciplines.
Able to communicate effectively and clearly present technical approaches and findings.
Develop technical solutions to complex problems which require the regular use of ingenuity and creativity.
Minimum Qualifications:
To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:

Bachelor’s degree with 9 years systems engineering experience in cyber security and network technology.
Must have a SECRET clearance.
Excellent written and verbal communications, presentation, organizational and time management skills.

Test Engineer 3 - Essex Business Unit
Business Sector: Information Systems
Location: United States-Maryland-Columbia
US Citizenship Required for this Position: Yes
Relocation Assistance: No relocation assistance available
Clearance Type: SCI w/Full Scope Polygraph
Number of Openings: 1
Shift: 1st Shift

Join us on the edge… The Cutting Edge! Northrop Grumman - Essex is a Market Leader in Developing and Delivering Agile Intelligence Enterprise.

Professional Experience:
Northrop Grumman Information Systems sector is seeking a Cyber Test Engineer to join our team of qualified, diverse individuals. This position will be located in the Columbia, MD area.

Roles and Responsibilities:
The Test Engineer will analyze system requirements and formulate, execute, and document a testing procedure which verifies the system operation meets requirements in response to stated operating conditions. The Test Engineer shall formulate tests to determine if modifications or upgrades change system operation from that of the original system. In addition, the individual shall perform testing to document system behavior when operated outside specified expected inputs.

Basic Qualifications:
To be considered for this position, you must minimally meet the knowledge, skills, and abilities listed below:
Bachelors Degree in Computer Science, Computer Engineering, Mathematics, Information Systems, or equivalent experience. (5) years experience in testing in the intelligence processing, storage, and retrieval systems. At least (3) years experience managing the testing of mid to large scale integration programs. Knowledge in writing test cases and discrepancy reports is required. Must be able to work in a fast paced environment where multiple projects are being developed and deployed simultaneously. Must be able to work well within a team environment. Must be able to adapt quickly to change.
Position requires a current TS/SCI w/ Polygraph Clearance.

Desired Skills:
Experience in architecture definition and design of solutions incorporating Hadoop and MapReduce frameworks.
Developing solutions certified and accredited at a DCID 6/3 PL3 plus Annex E.
Experience with governance of service-based systems development through standards assessment and management.
Market Leaders in Developing and Delivering Agile Intelligence Enterprise Solutions.
Innovators – Engendering a culture of creativity, investment, and teamwork to solve the ICs toughest problems.
Leadership Culture – that is delivering the future of management today – Leadership 2.0
Delivering Growth & Momentum – with a demonstrated ability to continuously expand our business & market opportunities in partnership with our employees thereby creating careers that make a difference.
All applicants are considered on the basis of relevant experience, basic qualifications, expressed interests, training, education, career interests, and other pertinent factors, regardless of race, color, religion, national origin, ancestry, age, sex, sexual orientation, disability, or Vietnam-era veteran status.


Basic Qualifications:
5 Years with Bachelors in Science; 3 Years with Masters; 0 Years with PhD.

Preferred Qualifications:

Master's Degree

Unless otherwise stated, the content of this page is licensed under Creative Commons Attribution-ShareAlike 3.0 License