Careers

At R&K, we’re at the forefront of cybersecurity.

Over the years, we’ve become a highly innovative, creative, and skilled team with a track record of successfully developing procedures, guidelines, products, and services. We are always looking for more qualified men and women to join our family.

So, if you are someone that genuinely buys into the vision of trying to make cybersecurity better, and is motivated enough to turn that vision into reality, values an outstanding benefits package, and enjoys a superior work-life balance, then we would love to hear from you.

BENEFITS

4 Health Insurance Options

GAP Insurance Options

Dental Plan

Life Insurance Options

Long-term Disability

Short-term Disability

Legal Option

HSA Option

PTO

401k Plan

Pension Plan

JOB OPENINGS

1Insider Threat Analyst
Location: Manassas, VA

The Insider Threat Analyst position conducts threat analysis, provide assessments of threat and vulnerabilities, produce investigative leads, uncover policy violations, assess risk posed by trusted insiders, oversees the data collection effort on the customer’s networks using UAM tools.

 

Key Responsibilities/Duties:

  • Identify potential risk factors and indicators and warnings of at-risk insiders.
  • Detect evidence of employee misconduct, policy violations, and potential information theft, sabotage and/or fraud.
  • Perform research to provide context for potentially concerning events.
  • Collect and track metrics and trends.
  • Uncover anomalies and discern obscure patterns and attributes.
  • Provide recommendations for new collection policies and for improvement of existing policies.
  • Synthesize information from audit collection, data mining operations and additional sources to compile results into investigative reports or analytical products as required.
  • Prepare and present analysis with findings and recommendations, in the form of briefings and/or reports, to government leads and managers as required.
  • Prepare monthly reports for customer regarding mission metrics, contractor activities and accomplishments, and relevant administrative items.

 

Basic Qualifications:

  • S. Citizenship.
  • Ability to maintain a TS/SCI clearance.
  • Minimum of three (3) year’s experience in any of the following fields:
    • Security
    • Law enforcement/investigations
    • Counterintelligence/HUMINT
    • Personnel security investigations/adjudications
    • Counterterrorism
    • Psychology/sociology
    • Computer network defense, information assurance, incident response, or cybersecurity
  • Bachelor’s Degree in discipline related to the above fields, or the equivalent combination of education, professional training, or work experience.

 

Other Requirements: 

  • Must be trained and proficient in the user activity monitoring (UAM) and auditing tools.
  • Must be familiar with the 13 national security adjudicative guidelines and standards.
  • Ability to demonstrate strong knowledge of insider threat concepts.
  • Demonstrated ability to document investigative and analytic activities.

 

 

Preferred Skills/Experience: 

  • Intelligence analyst/community experience.
  • Knowledge of US Government security and Insider Threat program standards as well as protocols and procedures associated with incident response and forensic investigations.
  • Should have an understanding of the intelligence cycle and architecture, to include planning, collection, research, analysis, and production.
  • Should be familiar with Foreign Intelligence Entity (FIE) and non-state entity use of technology to target, collect, and exploit DoD information and information systems, personnel, and operations.
  • People skills, and the ability to communicate effectively with various clients with the ability to explain and elaborate on technical details.
  • Excellent written and verbal communication skills.
  • Excellent problem solving skills.
  • Knowledge of Microsoft and Linux administration (including command line) preferred.
Apply Now
2Cybersecurity-Computer Network Defense Service Provider (CND-SP) Incident Responder-Level 4
Location: Washington, DC

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

Perform Tier 1 and 2 Computer Network Detect duties on a 24 X 7 X 365 network defense watch floor for an enterprise wide organization.

Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

1. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

2. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

3. Evaluate firewall change requests and assess organizational risk.

4. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

5. Assists with implementation of counter-measures or mitigating controls.

6. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational securi ty policies, through monitoring of vulnerability scanning devices.

7. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

8. Prepares incident reports of analysis methodology and results.

9. Maintains current knowledge of relevant technology as assigned.

10. Participates in special projects as required.

11. Responsible for the analysis and triage of network anomalies that should be considered Events of Interest (EOI). Will provide basic assessment of the anomaly; designate it as an EOI and coordinate response with CND response team.

12. Responsible for escalating EOIs to Responders in a timely manner; with all required information to ensure the response team may act upon it accordingly.

13. Must have a good understanding of networks at a packet level. Must be able to analyze packet captures at the expert level.

14. Must have experience using CND tools to detect network attack; these tools are:

15. Must have experience using CND tools to detect network attack; these tools are:

– Enterprise Security Information and Event Management Systems (SIEM).

– Intrusion detection and prevention systems (IDS; IPS).

– Web Content monitoring systems (WebSense; Bluecoat).

– Firewall and syslog logs.

16. Assists with implementation of counter-measures or mitigating controls.

Must be able to review multiple data sources to gather Indications and Warnings and Attack Sensing and Warnings information

Apply Now
3Cybersecurity-Computer Network Defense Service Provider (CND-SP) Auditor/Inspector-Level 4
Location: Norfolk, VA

Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

4. Evaluate firewall change requests and assess organizational risk.

5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operat ing systems.

6. Assists with implementation of counter-measures or mitigating controls.

7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational securi ty policies, through monitoring of vulnerability scanning devices.

8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

9. Prepares incident reports of analysis methodology and results.

10. Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.

11. May serve as a technical team or task leader.

12. Maintains current knowledge of relevant technology as assigned.

13. Participates in special projects as required.

Apply Now
4Cybersecurity Technical Specialist/Expert-Level 3
Location: Washington, DC

Broad scope of tasks to include tuning cyber defense tools, integration of Splunk, security architecture design, implement new cyber capabilities, implement regional based IPS, designs and defines system architecture for new or existing computer systems.

1. Performs complex systems development and design work that may include logic design, I/O design, firmware development, model formulation, manufacturing and development cost projections, computer architecture analysis and design, and analog or digital systems engineering.

2. Performs systems modeling, simulation, and analysis.

3. Plans upgrades of operating systems and designs systems enhancements.

4. Develops documentation on new or existing systems.

5. Develops and conducts tests to ensure systems meet documented user requirements.

6. Identifies, analyzes, and resolves system problems.

7. Provides system/equipment/specialized training and technical guidance.

8. Determines system specifications, input/output processes, and working parameters for hardware/software compatibility.

9. Provides guidance and work leadership to less-experienced systems engineers and may have supervisory responsibility.

10. May serve as a technical team or task lead.

11. Serves as liaison with clients, participating in meetings to ensure client needs are met.

12. Maintains current knowledge of relevant technology as assigned.

13. Participates in special projects as required.

⦁ Familiar with Splunk, HBSS, Soltera, Blue Coat, Encase, Tanium, integrations and implementations desired.

Apply Now
5Cybersecurity Systems Engineer-Level 4
Location: Washington, DC

Broad scope of tasks to include tuning cyber defense tools; integration of Splunk; security architecture design; implement new cyber capabilities; implement regional based IPS; designs and defines system architecture for new or existing computer systems.

  1. Performs complex systems development and design work that may include logic design; I/O design; firmware development; model formulation; manufacturing and
    development cost projections; computer architecture analysis and design; and analog or digital systems engineering.
  2. Performs systems modeling; simulation; and analysis.
  3. Plans upgrades of operating systems and designs systems enhancements.
  4. Develops documentation on new or existing systems.
  5. Develops and conducts tests to ensure systems meet documented user requirements.
  6. Identifies; analyzes; and resolves system problems.
  7. Provides system/equipment/specialized training and technical guidance.
  8. Determines system specifications; input/output processes; and working parameters for
    hardware/software compatibility.
  9. Provides guidance and work leadership to less-experienced systems engineers and may have supervisory responsibility.
  10. May serve as a technical team or task lead.
  11. Serves as liaison with clients; participating in meetings to ensure client needs are met.
  12. Maintains current knowledge of relevant technology as assigned.
  13. Participates in special projects as required.
Apply Now