Posted in

5G Vulnerability Research Analyst

5G Vulnerability Research Analyst

CompanyBooz Allen
LocationAnnapolis Junction, MD, USA
Salary$61900 – $141000
TypeFull-Time
DegreesBachelor’s
Experience LevelEntry Level/New Grad, Junior, Mid Level

Requirements

  • Experience with Linux command line environments
  • Experience scanning and analyzing information system vulnerabilities to assess risk to networks, operating systems, web applications, databases, and other components
  • Experience with network security and vulnerability analysis tools such as Wireshark, Burp Suite, Nessus, NMAP, and native Linux command-line tools
  • Experience with hands-on penetration testing, including manual exploitation and developing proof of concept exploits in various programming or scripting languages for web applications, mobile, and Linux systems
  • Experience with scripting languages, such as Python, Perl, Bash, or Ruby
  • Experience with virtual machines and containers to perform tasks, including deployment or performing security analysis of said systems
  • Knowledge of security frameworks, including NIST SP 800-115, STRIDE, and MITRE ATT&CK
  • Ability to obtain a TS/SCI clearance with a polygraph
  • Bachelor’s degree in Computer Science, Cybersecurity, or Information Technology and 1+ years of experience with mobile telecommunications systems, or 4+ years of experience with mobile telecommunications systems in lieu of a degree

Responsibilities

  • Work collaboratively with a team of researchers, developers, and telecommunications experts
  • Perform penetration testing, vulnerability research, generate reports and brief findings
  • Assist in the development of prototypes
  • Contribute to the design of security solutions for mobile telecommunications systems
  • Leverage comprehension of telecommunications networks, next-generation networking concepts, and protocol analysis to aid in vulnerability and security analysis
  • Apply knowledge of cybersecurity frameworks, methodologies, and skillsets to advise with team members, clients, and leadership on vulnerability projects

Preferred Qualifications

  • Experience with cloud or containerized technologies such as Docker, Kubernetes, OpenStack, virtualization, or software-defined networking
  • Experience creating or modifying proof-of-concept exploits in various programming and scripting languages
  • Experience performing incident response, forensics, or blue teaming activities
  • Experience in threat intelligence
  • Experience in reverse engineering
  • Experience with software development in C/C++ or Java
  • Experience with DSP, such as GNU Radio or Matlab, and Software Defined Radio
  • Experience with Radio Test Equipment
  • Knowledge of telecommunication protocols, architecture, and processes, including air interface protocols and L1-3