Description
As a Cybersecurity Specialist, you will play a critical role in protecting our client’s information systems against cyber threats. You will be responsible for identifying vulnerabilities, implementing robust security protocols, and responding swiftly to any security incidents. Your expertise will be pivotal in ensuring the integrity, confidentiality, and availability of sensitive data.
Responsibilities
- Evaluate and enhance methods for data acquisition, storage, and processing to optimize the data landscape.
- Implement effective data cleaning and preprocessing techniques to maintain high data quality and uniformity.
- Create and implement sophisticated statistical models and machine learning techniques to extract insights and aid in data-informed decision-making.
- Effectively present complex data findings, trends, and patterns to departmental stakeholders using interactive dashboards and reports.
- Work closely with Subject Matter Experts (SMEs) to select and prioritize data analysis initiatives in alignment with departmental goals and resource availability.
- Adhere to federal data privacy and security regulations, such as FISMA and GDPR, especially when handling sensitive information.
- Regularly assess and refine the performance of data models, proposing and executing improvements as necessary.
- Keep abreast of the latest developments in data science and incorporate these advancements to elevate processes and results.
Requirements
- A Bachelor’s degree is preferred, with a minimum of 7 years of experience in data science, analytics, or a related field, particularly within federal government settings.
- Proficient in programming languages like Python, R, or Java, and skilled in data manipulation and analysis tools (e.g., pandas, NumPy, TensorFlow).
- In-depth knowledge of statistical and Machine Learning methodologies, such as regression, clustering, and classification.
- Proficient in data visualization, with experience in platforms like Tableau, Power BI, or D3.js.
- Exceptional skills in communication, collaboration, and problem-solving.
- Must possess a current TS/SCI clearance with CI polygraph.
The Ideal Candidate
- Experience developing covert applications and Command and Control (C2) techniques
- Developed customized fuzzing tools
- Ability to demonstrate common rooting and hooking techniques
- Active participation in Capture the Flag (CTF) or other software hacking competitions