KMS Solutions, LLC, a wholly owned subsidiary of Subsystem Technologies, Inc. (SUBSYSTEMs), is dedicated to providing high quality consulting and technical services to commercial and Government clients. Our principals are experienced in and dedicated to serving the needs of US Government related activities. Specific market areas include the US Navy, the US Intelligence Community, the Department of Defense and its C4ISR programs, and other Federal technology and human capital management related activities. Our employees are located in the continental United States and globally deployed supporting decision makers at the highest levels of industry and the federal government with systems engineering, human capital development, and advisory & assistance professional services.
Computer Systems Analyst III
Location: Newport, Rhode Island
Prepare and validate authorization packages for computer systems security in the Risk Management Framework (RMF) for DoD IT. Analyzes network packet information, computer OS system data, executable file data, host data, and metadata in to identify and characterize anomalies on USG networks. Develops and analyzes exploitation tactics, techniques, and procedures for a wide range of operating systems. Provides reporting on activities, and assist in the development and optimization of new and existing tools and techniques to enhance analytic capabilities.
ACTIVE SECRET Clearance Preferred
Required at least five (5) years experience in Computer Network Exploitation, Vulnerability Assessment, Penetration Testing, Incident Response, Network and/or Server Forensics
At least one (1) year of experience in two of the following: File Hashing and Fuzzy File Hashing, Commercial, open source, or GOTS tools for intrusion detection, Packet capture/evaluation, Network mapping/discovery, Industry standard system/network tools.
At least two (2) years of experience in one of the following: development of exploits for Microsoft Windows operating systems, development of exploits for UNIX operating systems, development of exploits for personal computer device/mobile device operating systems, Software Reverse Engineering to include use of code disassemblers and debugging unknown code, analysis of code in memory, implementing networks with IPv6 protocols.
Bachelor's Degree in Computer Science or equivalent experience
Percentage of travel: Less than 10%
We Value The Cultural Differences Our Employees Bring To SUBSYSTEMs. We Are Proud Supporters Of Hiring Veterans And Count Them Among Our Finest.
We Are An Employer Of Choice And Are Committed To Our Employees Who, In Turn, Provide Continued Excellence And The Highest Service Quality Standards To Help Our Clients Achieve Their Mission.