Company Detail

Inferno Systems
Member Since,
Login to View contact details
Login

About Company

Job Openings

  • LINUX SYSTEM ADMINISTRATOR: Expert LevelLocation: Chantilly, VA USSecu... Read More
    LINUX SYSTEM ADMINISTRATOR: Expert Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current
    JOB DESCRIPTION:
    Inferno Systems is currently looking to hire individuals for our Linux System Administrator
    positions. Candidates should have a preferred minimum of 7+ years as a network engineer
    or systems admin. JOB SUMMARY:
    This position will require a solid understanding of Linux administration as you help design,
    build and test new systems employed by our customer to support ongoing operations. You
    will be responsible for maintaining, scheduling and executing software and hardware
    upgrades, patches and reconfigurations. You will identify and troubleshoot software and
    hardware issues with workstations and servers. You will support continuous system
    monitoring using a variety of tools. REQUIRED SKILLS:
    • Experience as a Linux Systems Administrator
    • Understanding of Linux operating systems, specifically Rocky and Ubuntu.
    • Running and updating repos
    • Maintaining and updating centralized audit, logging and backups
    • Experience with cron, iptables, permissions and SELinux
    • Proficient in at least one scripting language such as Python, Perl and/or Bash.
    • Solid understanding of Linux logging, network traffic analysis, network traffic redirection
    • Experience setting up and monitoring OpenVPN and Wireguard tunnels
    • Experience with NFS / CIFS
    • Organized, detail-oriented, a team player, and willing/eager to learn and handle multiple
    tasks concurrently.
    • Strong customer service and technical writing skills, inducing documentation and diagram
    creation
    • Experience using Jira for issue tracking and Confluence for documentation.
    • Experience with automation using Ansible, Terraform or other similar tools DESIRED SKILLS
    • Experience operating in a virtual environment such as VMware vSphere / ESXi, or KVM
    • Experience with Splunk
    • Experience monitoring network activity and network traffic redirection.
    • Familiarity with web proxies, common web servers (i.e. Apache, NGINX), SSL certificates,
    and DNS records.
    • Experience with installing, configuring and maintaining physical server hardware Read Less
  • NETWORK SECURITY ANALYST: Senior Level Location: Chantilly, VA USSecur... Read More
    NETWORK SECURITY ANALYST: Senior Level Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is searching for Network Security Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures, lateral movement, and any internal security mechanisms (IDS/IPS, host-based agents, etc). You will also analyze data collected from the target and assist with drafting operational reports of your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to penetrate and pivot through target networks. JOB SUMMARY:
    Inferno Systems is searching for Network Security Analysts to work on our red teams to identify and target network vulnerabilities, analyze large amounts of network data and make recommendations based on their analysis. This unique opportunity allows you to experience both sides of CNE activity, expand both your offensive and defensive skills and help you think like the attacker to improve operational success. You must like solving complex challenges, developing threat detection processes based on analytic findings and researching the latest cyber security solutions in a rapidly changing environment. REQUIRED SKILLS:
    • Experience in planning or executing cyber operations. • Proficient in data exploitation and data analysis.
    • Proficient in analyzing log files from web hosting services and other technical infrastructure.
    • Proficient in analyzing and exploiting raw PCAP collections.
    • Strong understanding of networking protocols and layers.
    • Experience analyzing and evaluating large amounts of data from multiple sources, operations, and demonstrated success converting findings into actions. • Demonstrated ability to mine data from customer tools and data repositories/databases. • Experience working across organizations to share information and coordinate future operations. • Proven ability to communicate technical requirements to development teams and represent stakeholder equities through ongoing relationships. • Knowledge of IT defensive best practices and the penetration testing lifecycle DESIRED SKILLS:
    • Experience using scripting languages for automation, parsing data sets, and data visualization/analytics (e.g. python, perl, etc.).
    • Knowledge of stand-alone automated configuration management systems (e.g.: Chef Solo, Ansible, Kickstart). • Ability to pay attention to details, ensuring accuracy in documentation and data.
    • Proficiency in PCAP analysis using tools such as Wireshark or Snort, as well as other network analysis data sets and tools such as Red Seal or EnCase.
    • Strong understanding of Windows domains.
    • Familiarity with methodologies to include understanding of web application protocols/flaws, redirection of network traffic, web browser vulnerabilities techniques.
    • Strong analytical and critical thinking skills, ability to think strategically.
    • Ability to express complex ideas and insights verbally and in writing to a variety of audiences.
    • Ability to remain open minded and change opinions based on new information and requirements. Read Less
  • TECHNICAL OPERATOR: Full Performance LevelLocation: Chantilly, VA USSe... Read More
    TECHNICAL OPERATOR: Full Performance Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is currently looking for proactive and self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of cyber operations, specifically conducting vulnerability research on targets and systems to gain network / system access. You should have experience developing technical operation plans and gaining approval to execute them, briefing options and risks, understanding technical aspects of plans and collaborating across other offices and/or the IC as necessary. You should understand the ops life cycle, be able to write reports and disseminate them and translate needs into requirements and actions to support them. BS degree must be in a technical discipline OR may substitute three years of sponsor-specific experience for BS degree. REQUIRED SKILLS:
    • 5+ years planning / developing / executing HUMINT operations
    • Prior experience in reviewing and analyzing HUMINT, SIGINT other data sources to develop operational planning.
    • A general understanding of wireless communications protocols and technologies, including cellular, Wifi and bluetooth
    • A general understanding of computer networks and a familiarity with clandestine technical collection capabilities and field operations. • Assist in reviewing, defining, and clarifying operational requirements. • Assist in researching, analyzing, and recommending complex technical operational approaches, processes/procedures, and equipment/systems. • Identify technical and operational constraints and methodologies and relate alternative solutions and risks.
    • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to meet operational needs. • Devise new techniques by applying technical capabilities in innovative scenarios DESIRED SKILLS
    • Prior experience in penetration testing, red team operations, incident response or computer forensics.
    • Ability to interact and communicate with individuals from diverse backgrounds and cultures and to convey technical information to non-technical individuals. • Ability to research, analyze, prioritize, problem solve, synthesize large amounts of data/information, and to work several tasks concurrently with minimal supervision. • Capable of handling stressful situations and demonstrated strong oral and written communications skills. • Previous overseas travel experience, including engaging with foreign partners. • Knowledge of complex geographic or functional areas or issues. • Knowledge of collection capabilities & methods and the relationship of intelligence gaps. • Knowledge of US Government policy issues as they relate to Internet law. • Knowledge of methods used to protect and safeguard resources, operations, and equities, and operational security. • Excellent interpersonal skills, sound judgment, good administrative and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations.
    • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
    • General technical certifications such as CompTIA Network+, Security+, Linux+ Read Less
  • NETWORK SECURITY ENGINEER: Expert LevelLocation: Chantilly, VA USSecur... Read More
    NETWORK SECURITY ENGINEER: Expert Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    If you are looking for a position that is different from your normal network / cyber security position, please keep reading. We are looking for Network Security Engineers who are familiar with both network defense and offensive techniques to support ongoing operations and secure our customers' networks. You will be assisting Penetration Testers with analysis of edge network devices to include vulnerability analysis and exploitation. We are looking for Network Security Engineers with a blend of network infrastructure management and familiarity with network penetration testing and offensive security. Candidates should have a minimum of 7+ years of experience as a Network Engineer, System Engineer or in the Cyber Security field as a hands-on penetration tester. Candidates with fewer years of experience will be considered on a case-by-case basis, depending on technical skill level. JOB SUMMARY:
    We are looking for Network Security Engineers to work on covert and secure networks. Prior penetration testing experience is not required but is a plus. This is a great position to transition from more traditional network engineering and network defense into the penetration testing field. This position will allow you to expand both your offensive and defensive networks security skills by using tools like Shodan, Maltego and various tools in the Kali Linux environment. Applicants for this position should have a solid understanding of network engineering with some exposure to bash and/or Python scripting. REQUIRED SKILLS:
    • Proficiency working in a Linux environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.).
    • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information security practices.
    • Experience using virtual infrastructure (e.g., vSphere).
    • Experience in a cyber-security role such as network defense, penetration testing and network forensics.
    • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure.
    • Proven ability to design and develop integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS:
    • Scripting including Python, Bash and Perl and frameworks like Ansible.
    • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.).
    • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred).
    • Experience performing analysis of log files from a variety of sources, to include individual host logs, network traffic logs, firewall logs and IPS logs.
    • Well-versed in leveraging and securing cloud platforms.
    • Demonstrated knowledge of information security discipline via industry certification such as: OSCP, CCSP, CISSP, SSCP, GIAC (Security Track).
    • Experience conducting incident response to include: research and identification of attack vector, malware mitigation and removal and documentation of event.
    • Motivated self-starter with an analytical focus, problem solving skills, time management skills and a passion for computer, network, or cyber security.
    • Actively seeks to enhance the group through knowledge sharing. Read Less
  • Location: Chantilly, VA USSecurity Clearance Requirement: TS/SCI with... Read More
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is currently looking for proactive and self-motivated individuals for our Linux Threat Hunter positions. In this unique position, you will be working closely with deployed Linux servers dealing with data flows and collection of network data to write malware signatures using regular expressions (regex). This is a high-visibility position which enables you to demonstrate operational impact to senior management by identifying known malware, finding unique patterns and anomalies to discover new threat actors and taking operational actions to achieve mission requirements. You should be comfortable working in a Linux (CentOS / Debian / Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. You should have multiple years developing operational plans and gaining approval to execute them, briefing options and risks, understanding technical aspects of plans and collaborating across other offices and/or the IC as necessary. Occasional / infrequent domestic and international (non-warzone) travel may be requested but is not required. BS degree must be in a technical discipline OR may substitute three years of sponsor-specific experience for BS degree. REQUIRED SKILLS:
    • Experience with Linux (CentOS / Debian / Ubuntu) systems administration
    • Ability to automate tasks through Bash / Perl / Python scripting
    • Understanding of network layers, protocols and flows
    • Familiarity with analyzing network traffic / PCAP data using open source, COTS and GOTS tools
    • Using regular expressions (regex) to develop network signatures
    • Experience planning / developing / executing HUMINT or SIGINT operations
    • Understanding of computer networks and a familiarity with clandestine technical collection capabilities and field operations. • Assist in reviewing, defining, and clarifying operational requirements. • Assist in researching, analyzing, and recommending complex technical operational approaches, processes/procedures, and equipment/systems. • Identify technical and operational constraints and methodologies and relate alternative solutions and risks.
    • Develop routine proposals incorporating appropriate technical and operational issues into a plan based on consensus. • Write correspondence and coordinate with participants regarding operational plans, vulnerability assessments, risk evaluations, possible remedies, or execution plans. When appropriate, prepare intelligence reports following guidelines. • Ability to analyze the operational environment to identify appropriate equipment/systems required to meet operational needs. • Devise new techniques by applying technical capabilities in innovative scenarios. • Provide technical feedback to ongoing development activities. DESIRED SKILLS
    • Prior experience in penetration testing, red team operations, incident response or computer forensics.
    • Experience with wireless communications protocols and technologies, including cellular, Wifi and bluetooth
    • Previous overseas travel experience, including engaging with foreign partners. • Ability to interact and communicate with individuals from diverse backgrounds and cultures and to convey technical information to non-technical individuals. • Capable of handling stressful situations and demonstrated strong oral and written communications skills. • Knowledge of complex geographic or functional areas or issues. • Knowledge of collection capabilities & methods and the relationship of intelligence gaps. • Knowledge of US Government policy issues as they relate to Internet law. • Knowledge of methods used to protect and safeguard resources, operations, and equities, and operational security. • Excellent interpersonal skills, sound judgment, good administrative and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations.
    • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
    • General technical certifications such as CompTIA Network+, Security+, Linux+ Read Less
  • Cyber Security Engineer: Mid LevelLocation: Chantilly / Herndon, VA US... Read More
    Cyber Security Engineer: Mid Level
    Location: Chantilly / Herndon, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is looking for Cyber Security Engineers with a minimum of 5+ years of experience in supporting routine patching of desktops and Windows servers in addition to scanning and network traffic analysis and reviewing network data and system logs for and out of date systems. Applicants for this position should have a solid understanding of network scanning and analysis, server patching and maintenance operations and industry best security practices. JOB SUMMARY:
    We are looking for IT Operations Engineers to assist managing and maintaining isolated LAN and other high-side networks. You will be working with network scanning and logging tools as well as end point agents to monitor network activity, investigate anomalous or suspicious traffic and work with system owners in a fast paced environment. REQUIRED SKILLS:
    • Demonstrated experience with standard cyber security policies, guidance, research, evaluation, and development of relevant security policies.
    • Demonstrated experience securing and providing risk mitigations for systems and applications in a cloud environment.
    • Demonstrated experience with system configurations, development and design, specifically around enterprise systems.
    • Demonstrated experience communicating both verbally and in writing, when responding to emails, telephone calls and in person inquiries from organizational personnel.
    • Demonstrated experience with A&A and information security systems.
    DESIRED SKILLS
    • Demonstrated experience with data science and data engineering tools and methods.
    • Demonstrated experience with the Sponsor's mission systems and applications.
    • Demonstrated experience with system configurations, development and design, specifically around enterprise systems that use the Sponsor's cloud offerings.
    • Demonstrated experience with Sponsor A&A and information security systems.
    • Certifications: ISACA Certified Information Security Manager (CISM), ISACA Certified Information Systems Auditor (CISA), ISC Certified Information Systems Security Professional (CISSP), ISC Certified Cloud Security Professional (CCSP), ISC Certified Authorization Professional (CAP).
    • Hands-on experience securing an isolated environment containing Windows workstations and servers in a 24x7 operational environment. • Experience identifying out-of-compliance workstations and servers and applying appropriate patches.
    • Understanding of user access controls and permissions management. • Experience with security monitoring and log event triage.
    • Proficiency monitoring network activity, to include performing network traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of common attack methodologies, tactics and protocols.
    • Understanding of cyber-security concepts such as network defense, security vulnerabilities and unusual network activity.
    • Understanding of information security best practices.
    • Experience and ability to research the latest security developments in the relevant operating systems to identify organizational impact.
    • Experience conducting incident response to include: research and identification of attack vector, malware mitigation and removal and documentation of events.
    • Motivated self-starter with an analytical focus, problem solving skills, time management skills and a passion for computer, network, or cyber security.
    • Actively seeks to enhance the group through knowledge sharing. Read Less
  • PENETRATION TESTER: Senior and Expert LevelsLocation: Chantilly, VA US... Read More
    PENETRATION TESTER: Senior and Expert Levels
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is currently looking for Penetration Tester positions with a minimum of 7+ years experience conducting technical security and/or vulnerability assessments. Please note the security clearance requirement above: candidates MUST have a current/active TS/SCI with Full Scope Poly to be considered. JOB SUMMARY: We are looking for Penetration Testers whose work will directly impact U.S. policymakers, military officials and law enforcement agencies. You should be able to use sophisticated techniques to identify vulnerabilities, exploit them, and gain and maintain access to targets. You will be performing offensive-like vulnerability assessments against network systems and IT infrastructure. You will identify weaknesses and recommend mitigation steps. You will draft assessment reports for review by senior management to implement your recommendations. You will be digging into hard problems by performing assessments on novel network devices, unique networks and hard targets. You will need to use a wide variety of skills to be able to demonstrate exploiting vulnerabilities and ensuring mitigation steps close the holes you find. REQUIRED SKILLS:
    • Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture.
    • Understanding in cloud computing platform technologies such as AWS, Microsoft Azure, Google, cloud computing environment and cloud security.
    • Demonstrated real world experience performing gray and black box penetration testing.
    • Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards.
    • Understanding of basic IP fundamentals and how protocols work • Ability to inspect and analyze new applications and traffic flows with the capability of breaking down the interactions between network devices and clients.
    • Experienced with network security technologies such as firewalls, proxies, iptables, AntiVirus (AV) products, Virtual Private Networks (VPNs) and Intrusion Detection Systems / Intrusion Prevention Systems (IDS/IPS).
    • Knowledge of exploitation concepts including phishing and social engineering tactics, buffer overflows, fuzzing, SQLi, MiTM, covert channels, secure tunneling and open source exfiltration techniques.
    • Proactive interest in emerging technologies and techniques related to penetration testing.
    • Proven ability to perform computer network vulnerability assessment and penetration testing.
    • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured.
    • Ability to research, prioritize, problem solve, synthesize large amounts of data/information, and to work several tasks concurrently and with little supervision.
    • Excellent interpersonal skills, sound judgment, and organizational/administrative skills.
    • Ability to communicate and interact with diverse technical and non-technical groups. DESIRED SKILLS: • Malware analysis or digital computer forensics experience is a plus.
    • Cyber related Law Enforcement or Counterintelligence experience.
    • Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats.
    • Understanding of risk planning and mitigation strategies.
    • Ability to prepare and present documents and briefing materials.
    • Understanding of networking and networking components.
    • Understanding the security implementation and setup for both system and networking functions, encryption methods.
    • Understanding of cellular technology from device turn on to power off, network functions (SMS, MMS, Voice, Data) and cellular system functions.
    • Understanding of wireless and RF technology. • Understanding and experience in conducting risk analysis, risk management, infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems:
    • Microsoft Windows (7 - 10, Server )
    • UNIX (Solaris, HP-UX, etc.,) Operating System versions
    • Common Linux distributions including RHEL / CentOS / Rocky and Debian / Ubuntu
    • OSX / iOS and Android
    • VMware / ESXi / KVM / OpenVZ or other virtualized environments
    • Linux variant Operating Systems versions
    • BSD variant Operating Systems versions Software / Scripting:
    • Java / C++
    • Bash / Perl / Powershell / Python Database Administration and application development with:
    • Oracle platforms
    • SQL Server
    • MySQL
    • Hadoop Wireless:
    • WiFi/WiMax/Bluetooth technology (hardware or core software)
    • Wired telephony technology (hardware or core software)
    • Mobile telephony technology (hardware or core software) Ubiquitous core network devices (switch/router/hub, hardware or core software):
    • Cisco
    • Juniper
    • Common firewalls and security appliances Web Penetration Testing:
    • Common web application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign-on limitations, etc. Tools:
    • Proficiency in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux, IPTables, Sysinternals, A/V evasion methodologies, exploit development. Certifications:
    • Advanced GIAC and/or (ISC)2 network/cyber security specialties such as OSCP, OSCE, GPEN, GWAPT, GPEN, GXPN, CEH, CISSP. Read Less
  • LINUX SYSTEM ADMINISTRATOR: Senior LevelLocation: Chantilly, VA USSecu... Read More
    LINUX SYSTEM ADMINISTRATOR: Senior Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is looking for proactive and self-motivated individuals for our Linux System Administrator - Splunk position. You should have a minimum of 7 years as a network engineer / system admin / security investigator working and administering a large Splunk deployment. You will serve as the SME for logging infrastructure that includes Splunk Enterprise and Cribil Stream. You will be responsible for operating and re-architecting as needed the logging and analysis platform based on Splunk and supporting technologies. You should be comfortable working in a Linux (CentOS / Debian / Ubuntu) environment, using SSH and being able to conduct regular Linux system administration, configuration and maintenance tasks. You will be able to help improve existing Standard Operating Procedures (SOPs) and documentation. REQUIRED SKILLS:
    • Previous experience delivering log data from network devices, servers and other systems to Splunk instances
    • Ability to optimize the design, engineering and operation of the platform
    • Provide engineering and administrative support for large clustered Splunks environments consisting of Search heads, deployment servers, universal forwarders and Splunk Enterprise Security
    • Perform data onboarding
    • Edit and maintain Splunk configuration files and apps in a Linux environment
    • Manage Splunk Knowledge Objects
    • Extensive experience working as a Linux system administrator including installing, engineering, maintaining, troubleshooting patching and making configuration changes to Linux servers
    • Ability to automate tasks through Bash / Perl / Python scripting
    • Solid understanding of Linux logging, network traffic analysis, and network traffic redirection (i.e. iptables). • Familiarity with web proxies (iptables, mod_proxy, digital certificates, etc.), common web servers (i.e. Apache, NGINX), SSL certificates, and DNS records. • Understanding of Linux operating systems (CentOS / Debian / Ubuntu) and the ability to research the latest technological developments in the relevant operating systems to identify impact and anticipate changes to the organization's operating environment. • Experience patching and updating Linux server operating systems and configuring Linux server network integration. • Experience monitoring network activity and network traffic redirection. • Experience in the design, implementation or maintenance of various layers of network infrastructure. • Be organized, detail-oriented, a team player, and willing/eager to learn. DESIRED SKILLS • The below Splunk courses may be taken prior to starting work on site and will be paid for
    • Splunk Enterprise System Administrator course completion
    • Splunk Enterprise Data Administrator course completion
    • Splunk Enterprise Cluster Administrator course completion
    • Prior experience in penetration testing, red team operations, incident response or computer forensics.
    • Experience working with orchestration tools such as Packer / Vagrant, Ansible, Puppet, Salt or similar
    • Capable of handling stressful situations and demonstrated strong oral and written communications skills. • Excellent interpersonal skills, sound judgment, good administrative and organizational skills. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
    • General technical certifications such as CompTIA Network+, Security+, Linux+ Read Less
  • CYBER NETWORK OPERATOR: Expert LevelLocation: Chantilly, VA USSecurity... Read More
    CYBER NETWORK OPERATOR: Expert Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    Inferno Systems is looking for proactive and self-motivated individuals to work as a Cyber Network Operator on a highly technical team conducting remote cyber operations. You should have a minimum of 7 years of related experience, have a solid background in the Penetration Test / Attack Lifecycle and be able to pivot and exploit while avoiding detection in high-security networks. You will be responsible for all phases of network exploitation and will be able to successfully attack and persist in customer networks which include a diverse set of network hosts and devices. You should have the ability to build out end-to-end specialized penetration testing and exploitation platforms while working closely with internal and external partners. This job requires experience working in a highly technical environment, mentoring more junior penetration testers, assisting with team projects and being able to complete tasks under a short deadline. REQUIRED SKILLS:
    • Experience working with and exploiting Microsoft Windows operating systems, all versions (Server / Desktop) within the last 5 years. • Experience with Linux operating systems, including CentOS, Debian, RHEL, Ubuntu and others, with and without SELinux.
    • Possess system administration level knowledge of operating systems (i.e.: Windows, Unix, Linux, Mac OS, Mobile OS's, etc.) • Experience with UNIX (Solaris, HP-UX, etc.) operating systems
    • Experience with BSD-based operating systems, including MacOS
    • Hands-on experience with common scripting / programming languages to automate tasks and/or parse data such as C++, Bash, Perl, PowerShell and Perl
    • Familiarity with / understanding of database administration and application development, including Oracle, SQL Server, and/or MySQL.
    • Familiarity with wireless (WiFi/WiMax/Bluetooth) technology (hardware or core software).
    • Familiarity with mobile phone operating systems (Android / iOS).
    • Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding / use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. • Experience managing and installing network technologies such as routers, switches, database servers and related technologies. • Understanding functionality and limits of available tools and techniques. • Understanding of technical risk assessment. • Understanding of various types of computer operations. • Experience operating in a virtual environments such as VMware Workstation / ESXi / vSphere and/or KVM virtual machines
    • Understanding of network architecture, protocols and data flows.
    • Understanding the basic Internet functionality, ISPs, and network traffic. • Understanding the basic authorities governing computer operations. • Ability to convey information in a clear and concise manner, both verbally and in writing. • Understanding of fundamental technical network analysis. • Understanding of current US laws and regulations governing the Internet. • Motivated self-starter with an analytical focus, problem solving skills, time management skills, and a passion for computer, network, or cyber security.
    • Understanding of Exploit methodology, processes and development.
    • Understanding of network scanning and vulnerability analysis/assessment DESIRED SKILLS:
    • Experience in a role as a computer network operator, possessing extensive penetration testing skills/experience to conduct vulnerability assessments leading to approved operational plans. • Experience working with orchestration tools such as Packer / Vagrant, Ansible, Puppet, Salt and/or Terraform or similar
    • C / C++ or Java software development.
    • Proficient with installation, management, and have development knowledge of technologies such as Apache or ISS web servers, web development (Perl, Java, XML/XSL). • Leverage previous military or IC computer network exploitation training to analyze attacks against networks and develop countermeasures. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH)
    • General technical certifications such as CompTIA Network+, Security+, Linux+ Read Less
  • Operational Systems Engineer: Senior LevelLocation: Chantilly, VA USSe... Read More
    Operational Systems Engineer: Senior Level
    Location: Chantilly, VA US
    Security Clearance Requirement: TS/SCI with Full Scope Polygraph
    Clearance Status: Must be Current JOB DESCRIPTION:
    We are looking for someone who is well versed in devops, linux system administration and
    has a background in penetration testing and/or systems engineering to assist penetration
    testers with automating tasks, creating virtual infrastructure and assisting in performing tests
    in a virtual environment. JOB SUMMARY:
    This position will require a mix of devops skills, linux system administration and network
    engineering. You stand up virtual infrastructure using hypervisors such as ProxMox and
    ESXi. You will work to automate the deployment of virtual machines, networks and
    software packages using things like ansible, git, python and bash scripting. You will assist
    with setting up virtual networks and VPN networks using pfSense and OpenVPN. You will
    help build and test new systems employed by our customer to support ongoing operations.
    You will install, configure, and maintain Linux operating systems including CentOS, Debian,
    RedHat and Ubuntu. You will analyze and resolve problems associated with the operating
    systems servers, hardware, applications and software. REQUIRED SKILLS:
    • Experience as a Linux Systems Administrator
    • Experience operating in a virtual environment such as VMware vSphere / ESXi, KVM
    and/or ProxMox
    • Experience or understanding setting up VPN networks using OpenVPN, Wireguard and/or
    pfSense firewalls.
    • Proficient in at least one scripting language such as Python, Perl and/or Bash.
    • Solid understanding of Linux logging, network traffic analysis, network traffic redirection
    (i.e. iptables).
    • Understanding of Linux operating systems (e.g. CentOS, Ubuntu, Fedora, Scientific Linux,
    Debian, etc.) and the ability to research the latest technological developments in the
    relevant operating systems to identify impact and anticipate changes to the organization's
    operating environment.
    • Experience in the design, implementation, procurement, tradecraft, or maintenance of
    various layers of network infrastructure.
    • Organized, detail-oriented, a team player, and willing/eager to learn. DESIRED SKILLS
    • Experience monitoring network activity and network traffic redirection.
    • Familiarity with web proxies (iptables, mod_proxy, digital certificates, etc.), common web
    servers (i.e. Apache, NGINX), SSL certificates, and DNS records.
    • Experience integrating LDAP with Windows Active Directory (AD)
    • Experience with Windows and network administration
    • Experience with Apache Solr
    • Experience with installing, configuring and maintaining physical server hardware Read Less

Company Detail

  • Is Email Verified
    No
  • Total Employees
  • Established In
  • Current jobs

Google Map

For Jobseekers
For Employers
Contact Us
Astrid-Lindgren-Weg 12 38229 Salzgitter Germany