View all jobs

(VV) Network Evaluator (TS/SCI w/ Poly)

San Antonio, Texas · Information Technology
The Kenjya-Trusant Group is seeking a Network Evaluator to support a client contract in the San Antonio, Texas area.


The Contractor shall evaluate operational or developmental networks and systems of U.S. Government and military customers for weaknesses and susceptibility to network attack, advise customers on countermeasures including configuration of commercial products or hardware or software additions, produce evaluation reports and brief customers on results.
  •  The Contractor shall conduct computer network defense:
    • Analyze computer network characteristics to identify computer network vulnerabilities.
    • Develop computer network reconstruction diagrams or reports for computer network defense purposes.
    • Assess system or computer network vulnerabilities using available methods and techniques (for example, port scanners, banner grabs).
    • Document analytic findings relevant to computer network defense.
    • Enter assets in a vulnerability management system.
    • Identify computer network intrusions using available methods and techniques.
    • Maintain situational awareness of current computer network defense conditions using information from external data sources (for example, computer network defense vendor sites, Computer Emergency Response Team (CERT) publications, SysAdmin, Audit, Network and Security (SANS) institute training, Security Focus).
    • Perform computer network defense trend analysis and reporting using correlated incident data. 
    • Recommend vulnerability mitigation strategies based on evaluation results. 
    • Report incidents and events relevant to computer network defense in accordance with policies and procedures.
  • The Contractor shall develop hardware and software tools:
    •  Design deployment and vulnerability analysis methods based on current operational or anticipated trends.
  • The Contractor shall perform system security and information assurance:
    • Conduct security evaluations of hardware or software components or architectures.
    • Develop mitigation strategies and countermeasures to address vulnerabilities of networks, products, and services.
    • Perform operational security monitoring and analyses of systems and networks for security vulnerability or violations. 
    • Perform security evaluations of operational computer networks and other information systems.
  • The Contractor shall plan missions:
    • Review Information Needs (INs) to understand operational, tactical or strategic mission requirements.
    • Submit a request for information (RFI) related to target and/or mission requirements.
    • Develop a strategic course of action based on target vulnerabilities, anomalous network activity, and/or mission capabilities.
    • Develop an operational or tactical course of action based on target vulnerabilities, anomalous network activity, and/or mission capabilities.
    • Research technology (for example, technical manuals, schematics, vendor specifications, standards) to understand capabilities and/or vulnerabilities of a system or computer network.
  • The Contractor shall conduct computer/network security:
    • ​​​​​​​Identify vulnerabilities to attack communications networks and systems and developing countermeasures. 
    • Implement, configure, and sustain computer/network security solutions (e.g., encryption, firewalls, anti-virus rule sets and intrusion detection/prevention systems).
    • Prevent, assess, and/or mitigate threats to information systems and infrastructures and the information contained in or transmitted by these systems. This encompasses threat reduction, vulnerability reduction, incident response, information assurance, and computer network operations, to include anomalies, discovering means of penetration, and exploiting information system infrastructures.
    • Be aware of principles, methods, tools, and procedures for auditing and logging computer and telecommunications network devices and applications.
    • Be aware of specifications, uses, and types of security hardware and software options.
    • Use the principles and methods of packet analysis (e.g., protocols, ports), including determining packet type and structure and identifying security weaknesses.
  • The Contractor shall use digital forensics:
    • ​​​​​​​Use forensic exploitation techniques and tools (e.g., Encase) used to gather information on information systems and computer networks.
    • Identify, preserve, and analyze sources of digital evidence or intelligence.
  •  The Contractor shall conduct exploitation and analysis:
    • ​​​​​​​Utilize methods and tools used for exploitation and analysis of computer system and network vulnerabilities.
    • Be aware of the process used to exploit types of hardware/software defects.
  • The Contractor shall use platforms/operating systems:
    • ​​​​​​​Be aware of the theoretical compatibility of operating systems.
  • ​​​​​​​The Contractor shall conduct vulnerability discovery:
    • ​​​​​​​Evaluate a system to test its security features and/or identify its vulnerabilities working under the same constraints applied to ordinary users.
    • ​​​​​​​Be aware of the process used to uncover and mitigate types of hardware/software defects with security impacts.
  • The Contractor shall analyze and produce intelligence information:
    •  Use critical thinking and reasoning to make analytic determinations.
    • Critically evaluate and select the appropriate formal methods of analysis.
    • Select, build, and develop query strategies against appropriate collection databases.
    • Evaluate information for accuracy, quality, completeness, relevancy and timeliness.
    • Identify and evaluate assumptions underlying information or data.
    • Identify relationships, trends, and patterns in, or draw conclusions from, information.
    • Merge information gathered from different authorities.
    • Monitor open and classified sources for useful information.
    • Use knowledge of customer requirements to analyze and process intelligence information.
    • Identify and analyze anomalous data (including metadata).
    • Conduct, evaluate or participate in research.
    • Be aware of intelligence reporting policies and procedures, such as dissemination practices, and legal authorities and restrictions.
    • Provide feedback to tool developers.
  • The Contractor shall create and maintain documentation of their analysis, tradecraft, research and knowledge.
  • The Contractor shall follow oversight and compliance:
    • ​​​​​​​ Comply with legal and regulatory policies and procedures required for the selector targeting, collection, processing, retention, and dissemination of information.
  • The Contractor shall use NSA/CSS Mission/Policies/Directives:
    • Apply NSA/CSS policies and directives.
  • The Contractor shall use information security:
    • Apply policies, procedures, and requirements for ensuring information security.
  • The Contractor shall acquire/share job knowledge/skill:
    • ​​​​​​​Learn and apply new technologies and work processes.
  • ​​​​​​​The Contractor shall train government and other Contractor personnel:
    • Provide formal and informal analysis tradecraft training in all forms including on- the-job training, creation of video training artifacts, conducting formal and informal training in physical or virtual classroom settings.
  • The Contractor shall work with others:
    • ​​​​​​​Provide customer service.
    • Provide timely and accurate responses to requests for assistance, information, products, or services.
    • Work with others across analysis disciplines in order to produce the best possible results.
  • All experience and education must be in a technical field directly related to the labor category and all degrees will be from accredited colleges or universities
  • Level 4
    • ​​​​​​​Eleven (11) years minimum experience and a Bachelor's Degree
    • Nine (9) years minimum experience and a Master's Degree
    • Seven (7) years minimum experience and a Doctorate Degree
    • Thirteen (13) years minimum experience and an Associate Degree
  • Level 3 
    • Eight (8) years minimum experience and a Bachelor's Degree 
    • Six (6) years minimum experience and a Master's Degree
    • Four (4) years minimum experience and a Doctorate Degree
    • Ten (10) years minimum experience and an Associate Degree
  • Level 2
    • Five (5) years minimum experience and a Bachelor's Degree
    • Three (3) years minimum experience and a Master's Degree
    • Two (2) years minimum experience and a Doctorate Degree
    • Seven (7) years minimum experience and an Associate Degree
  • Level 1
    • Two (2) years minimum experience and a Bachelor's Degree
    • Four (4) years minimum experience and an Associate Degree

THE KENJYA-TRUSANT GROUP, LLC is a Service-Disabled Veteran-Owned Small Business that was established in 2015 as a merger between The Kenjya Group, Inc. and Trusant Technologies, LLC. Our mission is to implement, support and protect the nation’s advanced technology systems, business processes and high-technology facilities. Working with the Department of Defense, Department of Homeland Security, the Intelligence Community, state and local governments, and commercial clients, Kenjya-Trusant provides cyber protection, information technology, engineering, construction management and acquisition support services. We are a small company with big company benefits, including Health, Dental, Vision, 401K, Bonus Potential, Flexible Spending Account, Life Insurance, Short- and Long-Term Disability, Paid Time Off, and a culture of teamwork and continuous learning. Come grow with us!

Share This Job

Powered by