anyone got these qualifications?
Dont know why employer or recruiters refuse to be realistic. this is a job listing i just came across.
CGI Federal Defense and Intelligence is seeking an experienced Computer Network Exploitation (CNE) Analyst for our location in Fort Belvoir, Virginia. The candidate will be assigned to help propose, develop, and coordinate appropriate Computer Network Operations (CNO) course of actions (COAs). Prefer candidates with SIGINT and Digital Network Analysis background.Specific Duties: Develop measures of effectiveness (MOEs) and processes to conduct battle damage and effectiveness assessment, detect and assess likely enemy mitigation efforts, and identify potential collateral effects Assist the customer in identifying authorities (DoD or Interagency) for all proposed COAs and identify specific interagency and potential coalition support and actions required Use customer-specific applications to produce time-sensitive intelligence reports to military and national consumers Review threat data from various sources, including appropriate Intelligence databases, to establish the identity and modus operandi of hackers active in customer networks and posing potential threat to customer networks Correlate data into standardized reports, develop cyber threat profiles, produce cyber threat assessments based on entity threat analysis Coordinate cyber threat tracking with counterpart organizations, and populate databases and web pages with critical CNO information needed for customer operations Recommend courses of action based on analysis of both general and specific threats Deliver reports, briefings, and assessments to customer leadership, facilitating in-depth technical and analytical understanding of cyber threat entities and environments Support information assurance and cyber threat mitigation decision makingPreferred Knowledge and Experience: Digital Network Analysis (IDNA) and/or Advanced Digital Network Analysis (ADNA) experience preferred. Demonstrated training/experience/knowledge of one of the following: C, C++, Perl, Java, Assembly Language, Hypertext Markup Language (HTML), JavaScript Prefer at least one of the following certifications: COMPTIA A+, Security+, Network+, Linux Technical experience in Digital Network Analysis and knowledge of the functions and capabilities of common components in IT architectures Knowledge of system and network administration, configuration best security practices, and configuration standards as they apply to IT security. Knowledge of research management procedures. Understanding of computer incident response procedures (proper collection, thorough investigation, unequivocal validation, and internal escalation) and protocols. Working knowledge of system and network exploitation, attack pathologies and intrusion techniques; denial of service attacks, man in the middle attacks, malicious code delivery techniques, fuzzing, automated network vulnerability and port scanning, botnets, password cracking, social engineering, network and system reconnaissance. Familiarity using the following tools: Cadence, Surrey, TrafficThief, CNE Portal and X-Keyscore. Analyst must also have working knowledge of collection systems and tools used to manage requirements along with the ability to develop new requirements and to provide assessments as needed on existing requirements. Demonstrated training/experience using Microsoft Windows 2000 (Server) and 2003 (Server), Microsoft Windows XP, UNIX, Linux and/or Solaris Operating Systems. Experience/knowledge of Operating System theory including Kernel functions, registry functions, process/thread handling, memory management, Remote Procedure Calls, Dynamic Link Libraries, file system manipulation, and application startup procedures. Experience/knowledge of Firewalls and intrusion detection/prevention systems. Experience/knowledge of buffer overflows and other code vulnerabilities, rootkit/malware discovery and removal, cross-site Scripting, and incident response techniques. Experience/knowledge in computer networking concepts. Solid understanding of Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), Domain Name System (DNS), Address Resolution Protocol (ARP), Routing Information Protocol (RIP), Open Shortest Path First (OSPF), Interior Gateway Routing Protocol (IGRP). Knowledge of typical network services and their associated ports (File Transmission Protocol (FTP), Secure Shell (SSH), TELNET network protocol, Network Basic Input/Output System (NetBIOS), Remote Procedure Call (RPC), Simple Mail Transmission Protocol (SMTP), Post Office Protocol 3 (POP3), Trivial File Transmission Protocol (TFTP), Secure Socket Layer (SSL) An Active TS/SCI is required to begin employmentAdditional Desired Knowledge, Skills, Abilitites: Incident Handling experience and forensic or digital media analysis training desired. Understanding of TCP/IP and the functioning of its component protocols, ability to read, analyze, and parse packet **** using various toolsets such as tcpdump, wireshark, editpcap, etc. Understanding of the OSI model and what protocols function at what layers is a plus. Intermediate malicious code analysis capabilities. Bachelor of Science Degree is preferred but not required, in Computer Science/Engineering, Information Systems Management, Information Assurance, Network Security, or other technical, IT-related field.Desirable to have: SIGINT and Intelligence background. Cisco Certified Network Associate (CCNA) or Intermediate Digital Network Analysis (IDNA) CISCO: Cisco Certified Network Professional (CCNP), Cisco Firewall Specialist, Cisco Intrusion Prevention Specialist (Cisco IPS) Microsoft: Microsoft Certified Professional (MCP), Microsoft Certified System Administrator (MCSA), Microsoft Certified System Engineer (MCSE) RedHat Linux: RedHat Certified Technician (RHCT), RedHat Certified Engineer (RHCE) Global Information Assurance Certification (GIAC): GIAC Security Essentials Certification (GSEC), GIAC Certified Intrusion Analyst (GCIA), GIAC Certified Incident Handler (GCIH) Certified Ethical Hacker Certified Information Systems Security Professional (CISSP) Other IT industry certifications in Operating Systems, networking, and network securityAt CGI, we're a team of builders. We call our employees members because all who join CGI are building their own company - one that has grown to professionals located in 100+ offices worldwide. Founded in 1976, CGI is a leading IT and business process services firm committed to helping clients win and grow. We have the global resources, expertise, stability and dedicated professionals needed to achieve results for our clients - and for our members. This is a great opportunity to join a winning team. CGI offers a competitive compensation package with opportunities for growth and professional development. Benefits for full-time, permanent members start on the first day of employment and include a paid time-off program and profit participation and stock purchase plans.We wish to thank all applicants for their interest and effort in applying for this position, however, only candidates selected for interviews will be contacted. No unsolicited agency referrals please.WE ARE AN EQUAL OPPORTUNITY EMPLOYER.