Created by arejoenah from the Noun Project

Why Work for BreakPoint Labs?

BreakPoint Labs is growing quickly and constantly seeking enthusiastic cybersecurity professionals to solve its clients’ most technical challenges. Through an established corporate culture, BreakPoint Labs embraces a highly technical, ‘geeky’ workforce passionate about developing and leveraging technology to secure cyberspace.

If you are interested in joining the BreakPoint Labs Team, please submit a copy of your resume to jobs@breakpoint-labs.com.

Why Us?

Blue Team Lead - Alexandria, VA

< BreakPoint Labs has an opening for a technical lead on the Security Assessment Team (Blue Team). The Blue Team Lead will manage, coordinate, perform and assist the Government in all facets of security auditing, assessments and with the DISA CCRI/CCROI process./>

Primary Responsibilities:

  • Serve as the technical lead on the Security Assessment Team (Blue Team).
  • Manage, coordinate, perform and assist the Government in all facets of security auditing, assessments and with the DISA CCRI/CCROI process.
  • Manage, coordinate and assist the Government in conducting security assessments on new technologies being introduced to the Coast Guard network.
  • Manage, coordinate and assist the Government in evaluating and approving all firewall rules IAW best practices, PPSM requirements, and applicable DOD policy and guidance.
  • Manage, coordinate and assist the Government in evaluating external website usage within the Coast Guard as appropriate.
  • Perform technical functions as a Blue Team Analyst during assessments.

Experience:

  • Experience performing manual and automated DoD STIG compliance auditing on multiple technologies (ex: Network Devices, Operating systems, and applications such as DNS, web, and database) through the use of STIGviewer, SCAP Compliance Checker, Policy Auditor, App Detective, and ACAS.
  • Experience performing vulnerability scans, checking for false positives, troubleshooting scan failures, and presenting results in context of DISA time lines and severity.
  • Ability to comprehend higher level controls such as DoD Security Requirements Guides, determine their applicability, how to check for compliance, how to remediate or mitigate in the case of noncompliance, and communicate this information verbally and in reports.
  • Deep understanding of the DISA CCRI scoring system, what it measures, and how the measurements work.
  • Ability to determine when to upgrade or downgrade the severity score of an audited system or specific finding based on special circumstances such as, combinations of findings that could be used together, or external mitigating factors.
  • Must have experience managing projects of similar size and scope.
  • Must have a foundational understanding of statistics and probability.
  • Knowledge of tools such as HBSS, SCCM, ACAS (NESSUS), CMRS, and SharePoint.
  • Must be a team player, mentor and proven leader.

Education Requirements:

  • Bachelor's Degree and 5 years IA or cyber experience required (or additional 6 years experience to replace Bachelor's).

Certification Requirements:

  • Certified as an IAT-III (CISSP, CASP CE, CISA, etc.) – Required within 3 months of hire.
  • Certified as a CSSP-AU (CEH, CISA, or GSNA) – Required within 30 days of hire.

Travel:

  • Travel expected to be 30%.

Clearance:

  • Must possess an active DoD Secret Clearance, and have the ability to maintain a clearance up to Top Secret Level.







Principal Cyber Security Analyst - Washington DC

< BreakPoint Labs has an opening for a Principal Cyber Security Analyst that will be a key team member on this highly visible, critical program that bridges DoD and DHS programs, and will be joining a team of highly respected technical professionals./>

Primary Responsibilities:

  • Contribute extensively to the maturation of company cyber and data science capabilities aligned to market and corporate experience.
  • Author and lead white papers, as needed, to address customer and/or industry issues.
  • Support the delivery teams in addressing customer data science issues.
  • Participate in the creation of technical demos, briefings, and oral presentations materials.
  • Deliver technical thought leadership and SME data science value in customer interactions.
  • Identify areas with on-site staff, and consultants to author content for proposals that address the requirements, instructions and evaluation criteria set forth by government solicitations as needed.
  • Collaborate with subject matter experts to research and document technical proposal details and to create winning responses while learning first-hand how work is performed.

Experience:

  • 10+ years of combined business and government contracting experience in the areas of Cyber solutions architecture, big-data analytics, deep learning initiatives, and implementing new approaches to data security and integrity.
  • Experience developing business in the Government market in the fields of information technology and cyber security.
  • Proven ability to communicate and implement new concepts quickly and write about complex subject matter.
  • Excellent communications skills both written and oral, with ability to construct systems architectures and technical solutions with internal key stakeholders as well as senior government officials.
  • Superior time management and organization skills, handling multiple simultaneous projects with stringent deadlines.
  • Ability to work effectively with a diverse range of people with a variety of skills, experience, and personalities.

Education Requirements:

  • Master’s degree in Computer Science or similar discipline.

Certification Requirements:

  • You must possess current DoD 8570 IAT Level III Certification or obtain within 6 Months of Employment.

Travel:

  • Up to 10% travel is required.

Clearance:

  • A current DoD Secret security clearance with the ability to pass / adjudicate at the Top Secret investigation level.







Data Security Analyst - Washington DC

< BreakPoint Labs is seeking a Data Security Analyst whom will be a key team member on a highly visible, critical program that bridges DoD and DHS programs. This individual will be joining a team of highly respected technical professionals./>

Primary Responsibilities:

  • Write queries to extract information from data stored in HBSS/ACAS.
  • Apply tags to systems within HBSS to support metrics and reporting functions.
  • Address data calls across the enterprise or leadership to gather data regarding vulnerable assets and trending across the enterprise.
  • Correlate data call information against reports and dashboards in systems such as ACAS, HBSS and SCCM.
  • Create and maintain customized dashboards used for technical professionals, managers and senior leaders to convey the status of the network.
  • Normalize tracking spreadsheets and reports to assure data consistency and accuracy.
  • Identify and report gaps in existing procedures and processes and provide recommendations for improvements.
  • Use pivot tables to work with large datasets and provide actionable information to decision makers.

Experience:

  • 2-4 years of experience in DoD or DHS Cyber Security (IAVM compliance, vulnerability management, compliance and reporting, or data analysis).
  • 2-4 years of experience with network security practices and/or system administration.
  • Knowledge of DoD and DHS policy and procedures.
  • Experienced in creating reports and documentation.
  • Must be a team player, eager to assist colleagues and government staff with handling evolving priorities and multiple tasks.
  • Must have the ability to work in a dynamic environment and meet projected suspense dates.

Certification Requirements:

  • Security+ CE - Required.
  • HBSS Certificate – Preferred. (Required within 6 months of hire).
  • ACAS Certificate – Preferred. (Required within 6 months of hire).

Travel:

  • Up to 10% travel is required.

Clearance:

  • Must have active DoD Secret Clearance.







ACAS Vulnerability Analyst - Alexandria, VA

< BreakPoint Labs has an opening for an ACAS Vulnerability Analyst whom will be a key team member on a highly visible, critical program that bridges DoD and DHS programs. This individual will be joining a team of highly respected technical professionals./>

Primary Responsibilities:

  • Perform vulnerability scans and audits on USCG sites systems to support CCRIs as the USCG technical representative.
  • Maintain and administer enterprise-wide ACAS system, performing vulnerability scanning and reporting.
  • Perform vulnerability scans on USCG public-facing website applications and report results to developers for remediation and/or mitigation.
  • Utilize automated scanning tools and a host of security-related, web based applications, to report, identify and track assets’ vulnerabilities throughout the systems lifecycle.
  • Provide ACAS customer support for the entire USCG organization; create and manage ACAS user accounts, monitor reoccurring monthly scans, configure Security Center asset lists, scan policies, reports and unique dashboards highlighting critical vulnerabilities and provide trend analysis; troubleshot and resolve customer issues and/or concerns, and provide ACAS training.
  • Ensure information assurance for devices on the Enterprise Networks (SIPR & NIPR) utilizing tools such as Assured Compliance Assessment Solution (ACAS), Tenable Nessus, HBSS, and Continuous Monitoring and Risk Scoring (CMRS).
  • Conduct vulnerability and compliance scans, resolve connection and access issues to ensure accurate scan data, analyzes vulnerability assessment data, creates reports, supports USCG Command Cyber Readiness Inspections (CCRI), and assists the Blue Team security assessment efforts.
  • Manage Tenable’s SecurityCenter and Nessus software used for the DoD Assured Compliance Assessment Solution (ACAS).
  • Analyze a networks security posture, implement various Information Assurance (IA) security controls, DISA Security Technical Implementation Guidelines (STIG), DHS directives, NIST security configuration checklists and security updates to systems and software to meet United States Cyber Command (USCYBERCOM) Information Assurance Vulnerability Management (IAVM) alert Communications Tasking Orders (CTO) and DHS Information Security Vulnerability Management (ISVM) alerts and policies; Create vulnerability risk assessment reports providing justification for USCG sites Authority to Operate (ATO) in accordance with FISMA and C&A requirements to include: DoD IAVM and Task Order compliance tracking through the Vulnerability Management System (VMS).

Experience:

  • DoD/DHS experience is desired, but not required.
  • Must be proficient with ACAS, HBSS, Nessus, MS Office.
  • Must be a team player, eager to assist colleagues and government staff with handling evolving priorities and multiple tasks.
  • Must have the ability to work in a dynamic environment and meet projected suspense dates.

Education Requirements:

  • Bachelor's Degree and 5 years Vulnerability Assessment Team or relative IT experience required (or additional 6 years’ experience to replace Bachelor's).

Certification Requirements:

  • Must be DoD 8570 IAT-II and CSSP-A compliant – Required within 30 days of hire.

Travel:

  • Up to 10% travel is required.

Clearance:

  • Must have Active Secret DOD clearance.

Cybersecurity Analyst - Dayton, OH or Vicksburg, MS

< BreakPoint Labs is seeking a Cybersecurity Analyst who applies technical and functional expertise to support defensive cyber operations for large-scale enterprise networks./>

Primary Responsibilities:

  • Conduct network monitoring and intrusion detection analysis using various defensive cyber tools, such as Intrusion Detection/Prevention Systems (IDS/IPS), Firewalls, Host Based Security System (HBSS), etc.
  • Correlate network activity across unclassified and classified networks to identify trends of unauthorized use.
  • Review alerts and packet-level data from sensors and document formal, technically-details incident reports, when necessary, for dissemination to end customers.
  • Research emerging threats and vulnerabilities to aid in the identification of network incidents.
  • Provide end customers with incident response support, including mitigating actions to activity and facilitate forensics analysis when necessary.
  • Collaborate with counterpart DCO organizations and Network Operations Centers (NOC) on possible threats and exchange analysis or other information on suspicious activity.
  • Provide quality customer service with excellent written and oral communication skills.
  • Provide direct support to the Defensive Operations Team Lead.
  • Operate in a 24x7 environment that requires weekends, holidays and alternate shift work.

Experience:

  • Experience performing technical analysis involving threat event data, evaluating malicious activity, documenting unusual files and data, and identifying tactics, techniques and procedures used by attackers to gain access to Windows, Mac OS and Linux platforms.
  • Knowledge of intrusion detection methods protecting DoD computer networks and systems.
  • Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings.

Education Requirements:

  • Minimum of an Undergraduate Degree in Computer Science, Information Assurance, IT Management, or related discipline (preferred)

Certification Requirements:

  • Security+ and Certified Ethical Hacker (CEH) certifications required within six (6) months from start date, in accordance with DoDD 8570.01-M requirements.

Travel:

  • Less than five percent (5%)

Clearance:

  • U.S. Citizenship is required.
  • Must possess an active DoD Secret Clearance, and be clearable up to Top Secret level.



Break the cycle.

Together, lets change the world. Let us be the ones to help.

Contact Us