This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

Inferno Systems - Chantilly, VA

posted 2 months ago

Full-time - Mid Level
Chantilly, VA
Professional, Scientific, and Technical Services

About the position

The Linux Threat Hunter position at Inferno Systems is designed for proactive and self-motivated individuals who will work closely with deployed Linux servers to manage data flows and collect network data. The role involves writing malware signatures using regular expressions and identifying unique patterns to discover new threat actors. This high-visibility position allows for significant operational impact and requires collaboration with senior management and other offices within the intelligence community.

Responsibilities

  • Work with deployed Linux servers to manage data flows and collect network data.
  • Write malware signatures using regular expressions (regex).
  • Identify known malware and discover new threat actors through pattern recognition.
  • Conduct regular Linux system administration, configuration, and maintenance tasks.
  • Improve existing Standard Operating Procedures (SOPs) and documentation.
  • Develop operational plans and gain approval for execution.
  • Brief options and risks related to operational plans.
  • Collaborate across offices and the intelligence community as necessary.
  • Analyze network traffic and PCAP data using various tools.
  • Assist in defining and clarifying operational requirements.

Requirements

  • Experience with Linux (CentOS / Debian / Ubuntu) systems administration.
  • Ability to automate tasks through Bash, Perl, or Python scripting.
  • Understanding of network layers, protocols, and flows.
  • Familiarity with analyzing network traffic and PCAP data using various tools.
  • Experience using regular expressions (regex) to develop network signatures.
  • Experience planning, developing, and executing HUMINT or SIGINT operations.
  • Understanding of computer networks and clandestine technical collection capabilities.
  • Ability to analyze the operational environment to identify required equipment/systems.

Nice-to-haves

  • Prior experience in penetration testing, red team operations, incident response, or computer forensics.
  • Experience with wireless communications protocols and technologies.
  • Previous overseas travel experience, including engaging with foreign partners.
  • Ability to communicate technical information to non-technical individuals.
  • Knowledge of US Government policy issues related to Internet law.
  • Technical certifications in penetration testing or cyber security.

Benefits

  • Competitive salary starting at $150,000 and above.
  • Opportunities for professional development and training.
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service