5G Vulnerability Research Analyst
Company | Booz Allen |
---|---|
Location | Annapolis Junction, MD, USA |
Salary | $99000 – $225000 |
Type | Full-Time |
Degrees | Bachelor’s |
Experience Level | Senior |
Requirements
- Experience with penetration testing
- Experience scanning and analyzing information system vulnerabilities to assess risk to networks, operating systems, web applications, and databases
- Experience with Linux command line environments
- Experience with network security and vulnerability analysis tools, including Wireshark, Burp Suite, Nessus, NMAP, and native Linux command-line tools
- Experience with scripting languages, including Python, Perl, Bash, or Ruby
- Experience with virtual machines and containers to perform tasks, including deployment, or performing security analysis
- Knowledge of security frameworks, including NIST SP 800-115, STRIDE, and MITRE ATT&CK
- Ability to obtain a TS/SCI clearance
- HS diploma or GED and 6+ years of experience with mobile telecommunications systems, or Bachelor’s degree in Computer Science, Cybersecurity, or Information Technology and 3+ years of experience with mobile telecommunications systems
- OSCP Certification
Responsibilities
- Perform penetration testing
- Conduct vulnerability research
- Generate reports and brief findings
- Assist in the development of prototypes
- Contribute to the design of security solutions for mobile telecommunications systems
- Leverage comprehension of telecommunications networks, next-generation networking concepts, and protocol analysis to aid in vulnerability and security analysis
- Manage projects
- Propose solutions
- Perform advanced hands-on security research
- Apply knowledge of cybersecurity frameworks, methodologies, and skillsets to advise with team members, clients, and leadership on vulnerability projects.
Preferred Qualifications
- Experience with software development in C, C++, or Java
- Experience with Digital Signal Processors, including GNU Radio or Matlab, and Software Defined Radio
- Experience with Radio Test Equipment
- Experience with cloud or containerized technologies such as Docker, Kubernetes, OpenStack, virtualization, or software-defined networking
- Experience performing incident response, forensics, or blue teaming activities
- Experience with threat intelligence
- Knowledge of reverse engineering
- Knowledge of telecommunication protocols, architecture, and processes, including air interface protocols
- Ability to create or modify proof-of-concept exploits in various programming or scripting languages
- Possession of written and oral communication skills