Posted in

5G Vulnerability Research Analyst

5G Vulnerability Research Analyst

CompanyBooz Allen
LocationAnnapolis Junction, MD, USA
Salary$86900 – $198000
TypeFull-Time
DegreesBachelor’s
Experience LevelMid Level, Senior

Requirements

  • Experience conducting manual exploitation methods
  • Experience scanning and analyzing information system vulnerabilities to assess risk to networks, operating systems, web applications, and databases
  • Experience with Linux command line environments
  • Experience with network security and vulnerability analysis tools, including Wireshark, Burpsuite, Nessus, NMAP, and native Linux command-line tools
  • Experience with scripting languages, including Python, Perl, Bash, or Ruby
  • Experience with virtual machines and containers to perform tasks, including deployment or performing security analysis
  • Knowledge of security frameworks, including NIST SP 800-115, STRIDE, and MITRE ATT&CK
  • Ability to obtain a TS/SCI clearance
  • HS diploma or GED and 6+ years of experience with mobile telecommunications systems, or Bachelor’s degree in Computer Science, Cybersecurity, or Information Technology and 3+ years of experience with mobile telecommunications systems
  • OffSec PEN-200 certification

Responsibilities

  • Perform penetration testing
  • Conduct vulnerability research
  • Generate reports and brief findings
  • Assist in the development of prototypes
  • Contribute to the design of security solutions for mobile telecommunications systems
  • Leverage comprehension of telecommunications networks, next-generation networking concepts, and protocol analysis to aid in vulnerability and security analysis
  • Apply knowledge of cybersecurity frameworks, methodologies, and skillsets to work with team members, clients, and leadership on vulnerability projects

Preferred Qualifications

  • Experience with software development in C, C++, or Java
  • Experience with Digital Signal Processors, including GNU Radio or MATLAB and Software Defined Radio
  • Experience with Radio Test Equipment
  • Experience with cloud or containerized technologies, such as Docker, Kubernetes, OpenStack, virtualization, or software-defined networking
  • Experience performing incident response, forensics, or blue teaming activities
  • Experience with threat intelligence
  • Knowledge of reverse engineering
  • Knowledge of telecommunication protocols, architecture, and processes, including air interface protocols
  • Ability to create or modify proof of concept exploits in various programming or scripting languages
  • Possession of written and oral communication skills