Created by arejoenah from the Noun Project

Why Work for BreakPoint Labs?

BreakPoint Labs is growing quickly and constantly seeking enthusiastic cybersecurity professionals to solve its clients’ most technical challenges. Through an established corporate culture, BreakPoint Labs embraces a highly technical, ‘geeky’ workforce passionate about developing and leveraging technology to secure cyberspace.

If you are interested in joining the BreakPoint Labs Team, please submit a copy of your resume to jobs@breakpoint-labs.com.

Why Us?

Cybersecurity Analyst - Dayton, OH or Vicksburg, MS

< BreakPoint Labs is seeking a Cybersecurity Analyst who applies technical and functional expertise to support defensive cyber operations for large-scale enterprise networks../>

Primary Responsibilities:

  • Conduct network monitoring and intrusion detection analysis using various defensive cyber tools, such as Intrusion Detection/Prevention Systems (IDS/IPS), Firewalls, Host Based Security System (HBSS), etc.
  • Correlate network activity across unclassified and classified networks to identify trends of unauthorized use..
  • Review alerts and packet-level data from sensors and document formal, technically-details incident reports, when necessary, for dissemination to end customers.
  • Research emerging threats and vulnerabilities to aid in the identification of network incidents..
  • Provide end customers with incident response support, including mitigating actions to activity and facilitate forensics analysis when necessary.
  • Collaborate with counterpart DCO organizations and Network Operations Centers (NOC) on possible threats and exchange analysis or other information on suspicious activity.
  • Provide quality customer service with excellent written and oral communication skills.
  • Provide direct support to the Defensive Operations Team Lead.
  • Operate in a 24x7 environment that requires weekends, holidays and alternate shift work.

Experience:

  • Experience performing technical analysis involving threat event data, evaluating malicious activity, documenting unusual files and data, and identifying tactics, techniques and procedures used by attackers to gain access to Windows, Mac OS and Linux platforms.
  • Knowledge of intrusion detection methods protecting DoD computer networks and systems.
  • Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings.

Education Requirements:

  • Minimum of an Undergraduate Degree in Computer Science, Information Assurance, IT Management, or related discipline (preferred)

Certification Requirements:

  • Security+ and Certified Ethical Hacker (CEH) certifications required within six (6) months from start date, in accordance with DoDD 8570.01-M requirements.

Travel:

  • Less than five percent (5%)

Clearance:

  • U.S. Citizenship is required.
  • Must possess an active DoD Secret Clearance, and be clearable up to Top Secret level.

Cyber Threat Analyst - Dayton, OH or Vicksburg, MS

< As a Cyber Threat Analyst, the incumbent applies functional and technical skills to collect, normalize, and characterize cyber incident and event data to identify anomalous or malicious activity, including cyber intrusions, attacks, data loss, or other prohibited activities. Additionally, the Cyber Threat Analyst analyzes and correlates cyber incidents and events that may involve foreign intelligence entities and warn of anticipated hostile actions against DoD information systems or networks./>

Primary Responsibilities:

  • Receive and take initial action on warning intelligence information received from intelligence organizations:
    • Perform preliminary analysis on warning intelligence information.
    • Share warning intelligence notifications, notes, reports, and information with end customers.
  • Enable end customers to prevent or mitigate the potential impact of cyber attack:
    • Develop and distribute countermeasure to prevent/mitigate potential cyber event impacts to networks and information systems
    • Share countermeasures or interim guidance to prevent/mitigate cyber event impacting networks and information systems with peer DCO organizations and end customers.
  • Analyze cybersecurity threats:
    • Identify potential impact to end customer operations through analysis of warning intelligence information.
    • Analyze intelligence reports, forensic reports, and reverse engineering of malware reports to determine associated indicators of compromise (IOCs) and utilize the IOCs to develop and distributes countermeasures to detect and prevent identified threats.
    • Evaluate IOCs derived from incidents to determine association with known computer network exploitation (CNE) groups and thoroughly investigate the IOCs for other infrastructure possibly related to the CNE teams (domain registrations, IP ownership, VPN infrastructure, strains of malware, etc) for consideration of additional proactive defensive measures.
    • Share cyber intelligence with peer DCO organizations and end customers.

Experience:

  • At least 5 years of Linux and Networking experience.
  • At least 3 years of in-depth knowledge of IDS, IPS, and Host-based security solutions.
  • At least 2 years of experience working with malware analysis tools, such as IDA Pro, Cuckoo Sandbox, OllyDbg, etc.
  • Strong programming skills, specifically in Python and C/C++.
  • Must be able to communicate effectively, and interpret regulatory guidance and identified vulnerabilities to a wide audience. Presentation and public speaking skills required

Education Requirements:

  • Minimum of an Undergraduate Degree in Computer Science, Information Assurance, IT Management, or related discipline (preferred)

Certification Requirements:

  • Security+ and Certified Ethical Hacker (CEH) certifications required within six (6) months from start date, in accordance with DoDD 8570.01-M requirements.

Clearance:

  • U.S. Citizenship is required.
  • Must possess an active DoD Secret Clearance, and be clearable up to TS/SCI Level.






Cybersecurity Engineer - Dayton, OH or Vicksburg, MS

< As a Cybersecurity Engineer, the incumbent provides Systems Administration and integration of cybersecurity technologies to support large-scale 24x7 defensive cyber operations. The operating environment utilizes a variety of networked Linux and Windows-based operating systems that collect, ingest, and analyze cybersecurity related data./>

Primary Responsibilities:

  • Apply and maintain cybersecurity for defensive cyber operations (DCO) systems:
    • Utilize defense-in-depth strategies and methods to harden DCO systems and networks.
    • Monitor availability and performance of DCO systems and capabilities, such as Intrusion Detection/Prevention Systems (IDS/IPS), Firewalls, Host Based Security System (HBSS), etc.
    • Work with appropriate personnel to ensure policies and procedures are documented (e.g system accreditation for all systems supporting DCO, defense-in-depth measures applied to DCO systems, anti-malware and system protection are provided to DCO systems, vulnerability scans and management are addressed)
    • Ensure all internal networks and information systems are tested and authorized in accordance with DoD Risk Management Framework (RMF)
  • Ensure business continuity for cybersecurity operations and IT systems:
    • Align continuity plans of DCO systems with hosting infrastructure. Plans should address emergency, contingency, and/or recovery operations including support for component failures, capability failures, communications failures.
    • Ensure secure backup of DCO systems and data through formally documented backup plan, accurate and up-to-date listing of DCO systems to be backed up, proper storing and labeling of completed backups.

Experience:

  • A total of 7 years relevant IT experience: 7 years experience in Information Systems and/or security experience with at least 5 of those years in network software and hardware
  • Expertise in Linux, and a working knowledge of Windows operating systems.
  • Experience with system monitoring and troubleshooting.
  • Familiarity with DOD and Army policies and procedures.
  • Experience documenting technical standards and procedures.
  • Working knowledge of networking technology including, switches, firewalls, and routers.

Education Requirements:

  • Minimum of an Undergraduate Degree in Computer Science, Information Assurance, IT Management, or related discipline (preferred).

Certification Requirements:

  • Security+, Certified Ethical Hacker (CEH), and Linux+ certifications required within six (6) months from start date, in accordance with DoDD 8570.01-M requirements.

Clearance:

  • U.S. Citizenship is required.
  • Must possess an active DoD Secret Clearance, and be clearable up to Top Secret level.






Business Development Analyst

< BreakPoint Labs is actively seeking a part time Business Development Analyst to assist in various aspects of pursuing new business opportunities, including marketing communications, opportunity identification, proposal development, and market/pricing analysis. The successful candidate will demonstrate the skills and ability to align the BreakPoint Labs’ cybersecurity service offerings with potential customers and opportunities in both commercial and federal markets./>

Primary Responsibilities:

  • Establish processes to effectively identify contract opportunities and support monitoring, as necessary, throughout the qualification and bid and proposal phases
  • Translate contract requirements into initial outline and compliance matrix for Proposal Manager
  • Review and edit proposal sections and volumes, maintain the proposal schedule, and provide direct support the Proposal and/or Capture Managers
  • Manage marketing communications functions, including social media forums, collateral, and other advertising opportunities
  • Search and analyze applicable industry forums, such as conferences and technical interchange gatherings, for potential corporate engagement (sponsorship, speaking, etc.)
  • Conduct formal market and pricing analysis to support bid and proposal process
  • Actively contribute to corporate growth strategy

Experience:

  • A track record of successful business development and/or marketing communications experience
  • Outstanding organizational skills, attention to detail, and oral and written communication skills
  • Proficiency in using Microsoft Office, especially Word, PowerPoint, & Excel
  • Ability to communicate complex programmatic information to Leadership, often in the form of verbal or visual reports and briefings

Education Requirements:

  • Minimum of an Undergraduate Degree

Certification Requirements:

  • None

Travel:

  • Less than five percent (5%)

Break the cycle.

Together, lets change the world. Let us be the ones to help.

Contact Us