Vacancy expired!
- Knowledge of Computer Network Defense policies, procedures, and regulations
- Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture
- Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Identify and analyze anomalies in network traffic using metadata
- Reconstruct a malicious attack or activity based on network traffic
- Examine network topologies to understand data flows through the network
- Skill in preserving evidence integrity according to standard operating procedures or national standards
- Must have Active TS/SCI Clearance