Job Description
Job Summary:
At SandTech Solutions we are committed to “Enabling Success” of our client’s missions. As such, we are searching for the right candidate for the position of Cyber Exploitation Analyst to join our team. The successful candidate will be responsible for evaluating and analyzing cyber threats, vulnerabilities, and cyber incidents to develop actionable intelligence and countermeasures. As a Cyber Exploitation Analyst, you will contribute to the identification and mitigation of security risks, while supporting ongoing cyber defense efforts.
Minimum Clearance Required:- Active DOD Top Secret Clearance
Education/Certification Requirements:
- Active CompTIA Security + certification
OSCP certification
Experience in AWS and Kubernetes Environments
Experience in Cloud Penetration Testing
Preferred Qualifications:
- Relevant certifications, such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), or GIAC Certified Forensic Analyst (GCFA).
- Experience with digital forensics and incident response.
- Knowledge of network security architecture and systems.
Work Experience & Skill Requirements
- At least 5 yearsof experience in Cyber Exploitation analysis or a similar role.
- Strong understanding of cyber threats, vulnerabilities, and exploitation techniques.
- Proficiency in computer programming languages, such as Python or C++.
- Knowledge of various operating systems and network protocols.
- Familiarity with cybersecurity frameworks and industry best practices.
- Excellent analytical and problem-solving skills.
- Ability to work effectively both independently and as part of a team.
- Strong communication and collaboration skills.
Primary Responsibilities:
- Utilizes authorized resources and diverse analytic techniques to penetrate targeted networks, focusing on identifying access and collection gaps and recommending appropriate cyber collection activities.
- Conducts comprehensive Cyber Exploitation and forensic analyses on diverse systems and networks, employing advanced tools and techniques to gather actionable intelligence.
- Identifies, evaluates, and exploits vulnerabilities in systems and networks using cutting-edge methods and tools, emphasizing comprehensive exploitation and risk assessment strategies.
- Develops and implements effective countermeasures and protocols to proactively mitigate cyber threats based on exploitation findings and assessments.
- Collaborates seamlessly with other teams to investigate and respond to cyber incidents and breaches, ensuring a coordinated and swift response.
- Produces detailed reports outlining findings and offers recommendations for enhancing cybersecurity measures based on exploitation and forensic analyses.
- Stays abreast of the latest trends and advancements in cyber threats and exploitation techniques, continuously updating knowledge and skills to adapt defensive strategies accordingly.
- .
Physical Requirements:
- Prolonged periods of sitting at a desk and working on a computer.
- Must be able to lift up to 15 pounds at times.
AAP/EEO Statement
It is the policy of SandTech Solutionsto provide an equal employment opportunity for all applicants and employees. The Company does not unlawfully discriminate on the basis of race, religion, color, sex, gender identity, sexual orientation, national origin, ancestry, age, medical condition, disability, workers’ compensation status, or veteran status.
Job Information Summary:
Location: San Antonio, Texas - Hybrid
Job Type: 40 hours per week
At SandTech, our employees enjoy benefits to support their physical, financial, and emotional wellness. These benefits include comprehensive medical, dental and vision plans, 401(k), life insurance, paid time off program with paid holidays and various wellness programs. Additionally, our career path planning assists employees with their professional goals.