NetCentrics Corporation
  • 23-Dec-2020 to Until Filled (EST)
  • DC, USA
  • Salary
  • Full Time
  • TS/SCI CI Poly

Title: Cyber Protection Team Master Host Analyst (Linux/Unix)

Location: Washington, D.C.

Clearance: TS/SCI with a CI polygraph


  • Analyze Linux/Unix file systems, permissions, and operating system configurations in order to detect vulnerabilities and intrusions
  • Capture the memory of individual Linux/Unix processes and analyze it using built-in tools and capabilities
  • Navigate and search Linux/Unix file system structure and common processes for vulnerabilities, anomalies, backdoors, rootkits, remote-access tools, malware, etc.
  • Monitor, research, analyze, diagnose, and configure/manage Linux/Unix virtualization and Linux/Unix in virtualized environments to detect and respond to anomalies, vulnerabilities, and cyber incidents
  • Utilize scripting to develop common automation tasks in order to develop custom modules and functions to identify anomalies or suspicious machines
  • Perform initial triage procedures on potentially malicious Linux/Unix systems using best business practices
  • Patch Linux/Unix system vulnerabilities to ensure information is safeguarded against outside parties
  • Monitor operational environment and report on adversarial activities which fulfill leadership's priority information requirements
  • Conduct network and system level reconnaissance and vulnerability analysis of other systems within a network
  • Identify and conduct network mapping and operating system (OS) fingerprinting activities
  • Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
  • Conduct open source data collection via various online tools
  • Edit or execute scripts (e.g., Python, Bash/shell, PERL, PHP) on Linux/Unix systems to perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data
  • Deploy cyber tools to a target Linux/Unix system and utilize them once deployed (e.g., backdoors, sniffers)
  • Determine and document software patches or the extent of releases that would leave Linux/Unix software vulnerable
  • Identify Linux/Unix applications and operating systems of a network device based on network traffic
  • Validate intrusion detection system (IDS) alerts
  • Confer with systems analysts, engineers, programmers, and others to design application and to obtain information on project limitations and capabilities, performance requirements, and interfaces
  • Evaluate Linux/Unix system security architecture and its design against cyberspace threats as identified in operational and acquisition documents
  • Perform security reviews and identify gaps in Linux/Unix environment security architecture and develop a security risk management plan
  • Provide and maintain CPT documentation for TTPs as inputs to training programs
  • Work with stakeholders to resolve Linux/Unix computer security incidents and vulnerability compliance
  • Identify potential points of strength and vulnerability among Linux/Unix segments of a network map
  • Assist in the construction of signatures which can be implemented on cyber defense tools in response to new or observed threats within a given Linux/Unix network enclave
  • Detect exploits against targeted networks and Linux/Unix hosts and react accordingly
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on Linux/Unix systems and information
  • Isolate, extract, analyze, remove, and document malware on Linux/Unix systems
  • Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan
  • Plan and recommend modifications or adjustments based on exercise results or system environment


  • Bachelor's degree desired, but not required
  • 4+ years of experience conducting or supporting Cyber Mission Forces exercises
  • 5+ years of experience as a Certified Senior Level Analyst
  • Must be compliant with the Enterprise Diagnostic and Troubleshooting Training
    • Enterprise Linux System Administration
    • Active Defense Offensive Countermeasures and Cyber Deception (SEC550)
    • SIEM with Tactical Analytics (SEC555)
    • Offensive Security Certified Practitioner (OSCP)
    • Offensive Security Certified Expert (OSCE)
  • Active DOD 8570 IAT Level III certification
  • Active TS/SCI security clearance with a CI polygraph or the ability to obtain and maintain a CI polygraph
  • As a contingency to employment at NetCentrics, all candidates who are given offers must successfully pass a background investigation including criminal history and reference checks

This employer participates in E-Verify and will provide the federal government with your Form I-9 information to confirm that you are authorized to work in the U.S. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status or on the basis of disability.

Equal Opportunity Employer/Veterans/Disabled


NetCentrics Corporation
  • Apply Now

    with our quick 3 minute Application!

  • * Fields Are Required

    What is your full name?

    How can we contact you?

  • Sign Up For Job Alerts!

  • Share This Page
  • Facebook Twitter LinkedIn Email
logo About Us Contract Vehicles Contact Us Our Expertise Who We Serve Our Next 25 Culture and Careers News and Insights