- All
- Status Update
- Hiring Needs
- Events
- Groups Joined
- Groups Messages
Hi there! I’m a Senior Technical Recruiter with ECS Tech. We are in need of a Sr. Cybersecurity Analyst in Clarksburg, WV. I’d like to have a 15-20 minute conversation to find out if it would be mutually beneficial. • Must have a Top-Secret Clearance with SCI Poly Eligibility • Bachelors in Cybersecurity, Computer Science/Electrical Engineering, Engineering (or equivalent) with 1+ yrs of experience or a master's and 1+ years of experience. • 2+ years of experience in performing vulnerability assessments, network mapping, and service enumerations within a DOD Network Environmental • Assist the design and deployment of offensive tools and techniques, including social engineering, security monitoring evasion, and custom tools for network exploitation. • Ensure operations are conducted in a manner that mimics both known and emerging threats to test security readiness effectively. • Regularly update attack techniques to emulate the latest cyber adversaries and align with real-world tactics, techniques, and procedures (TTPs). • Develop and enforce guidelines and rules of engagement tailored to each operation, balancing realism with safety to avoid system disruptions. Are you open to a chat? Thank you, Yazmin Tome
Hi there! I’m a Senior Technical Recruiter with ECS Tech. We are in need of a Sr. Cybersecurity Analyst in Clarksburg, WV. I’d like to have a 15-20 minute conversation to find out if it would be mutually beneficial. • Must have a Top-Secret Clearance with SCI Poly Eligibility • Bachelors in Cybersecurity, Computer Science/Electrical Engineering, Engineering (or equivalent) with 1+ yrs of experience or a master's and 1+ years of experience. • 2+ years of experience in performing vulnerability assessments, network mapping, and service enumerations within a DOD Network Environmental • Assist the design and deployment of offensive tools and techniques, including social engineering, security monitoring evasion, and custom tools for network exploitation. • Ensure operations are conducted in a manner that mimics both known and emerging threats to test security readiness effectively. • Regularly update attack techniques to emulate the latest cyber adversaries and align with real-world tactics, techniques, and procedures (TTPs). • Develop and enforce guidelines and rules of engagement tailored to each operation, balancing realism with safety to avoid system disruptions. Are you open to a chat? Thank you, Yazmin Tome
HIRING a HYBRID Mid-level Software Engineer for a customer in the Springfield area! Please message me with and apply to the position (link below)!
HIRING a HYBRID Mid-level Software Engineer for a customer in the Springfield area! Please message me with and apply to the position (link below)!