Location:Huntsville, AL, USAPay Type:Salary
Benefits:Extensive Benefit Options AvailableEmployment Type:Full Time

Quantum Research International, Inc. (Quantum) provides our national defense and federal civilian and industry customers with services and products in the following main areas: 1) Cybersecurity and Information Operations; 2) Space Operations and Control; 3) Aviation Systems; 4) Ground, Air and Missile Defense, and Fires Support Systems; 5) Intelligence Programs Support; 6) Experimentation and Test; 7) Program Management; and (8) Audio/Visual Technology Applications. Quantum's Corporate Office is located in Huntsville, AL, but Quantum actively hires for positions nationwide and internationally. We pride ourselves on providing high quality support to the U.S. Government and our Nation's Warfighters. In addition to our corporate office, we have physical locations in Aberdeen, MD; Colorado Springs, CO; Shalimar, FL; and Tupelo, MS


Quantum is seeking Cyber Security Operations Analyst to provide support to the National Cyber Security Operations Center's monitoring, management, and/or testing of client assets associated with Operational Technology (OT) Networks which processes operational data such as telecommunication, technical components, computers and it is used to monitor devices and various industrial processes to include (but not limited to): Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) systems, distributed control systems (DCS), Remote terminal units (RTU) and programmable logic controllers (PLC) as well as dedicated networks and organization units.

In this role, selected candidates as a member of the Vulnerability Assessment and Penetration Testing Team, Continuous Compliance Assessment and Monitoring Team or the Incident Response Team will be tasked with working with clients with Operational Technology Networks to assist in enhancing the defensive cybersecurity posture of these networks. The candidate will work with cutting edge tools that help enhance the visibility of OT environments by providing asset discovery and threat detection as well as enabling incident response when needed.

Responsibilities may include:

  • Systematic non-intrusive technical approach (automated and manual scans) to find the security loopholes in an OT network or software system (Vulnerability Assessment) without jeopardizing the OT infrastructure or application's operations.
  • Develop a report showing all vulnerabilities, categorized based on their severity and identify the remediation actions to mitigate the identified vulnerabilities.
  • Conduct penetration testing (PT) to actually explore and exploit vulnerabilities to confirm whether the vulnerability really exists and further prove that exploiting it can result in damage to the application or network. The PT must be accomplished without disrupting OT network operations. mediation. As a summary, shown below are the steps involved in the VAPT process.
  • Utilizing cutting edge tools maintain visibility of OT environments with complete asset discovery and threat detection as well as enabling effective incident response.
  • Perform thorough investigations and root cause analysis across IT and OT networks to reduce mean time to detection of threats.
  • Leverage the power of industrial threat detection provided by the OT sensors to improve complete situational awareness and decision-making.
  • Maintain passive OT network monitoring to support improved asset identification & mapping, proactive anomaly & threat behavior detection, and threat response & recovery.
  • Work in a collaborative environment, analyze data, identify vulnerabilities and determine a company's security posture.
  • Build scripts, tools, and methodologies to enhance the team's processes.
  • Develop and present comprehensive and accurate reports, training, and presentations for both technical and executive audiences.


  • Bachelor's Degree in a technical discipline desired, but years of experience and certifications may be accepted in lieu of Degree. Applicable Certifications include any of the following: CISA, CEH, GCFA, GCFE, GNFA, CySA+, GCIA, GCIH, OSCP, GSEC Security+, A +, or Net +.
  • Familiarity with OT sensors and Security Information and Event Management (SIEM) platforms (e.g., SPLUNK).
  • Familiarity with VAPT tools (e.g., Nessus Pro, Nessus ICS, Nmap, Metasploit, etc.)
  • Experience developing documentation and explaining technical details in a concise, understandable manner.
  • Capability to work in a team environment and independently as needed.
  • Ability to travel up to 10%
  • Selected applicants will be subject to a government security clearance investigation and must meet eligibility requirements for access to classified information.

Equal Opportunity Employer/Affirmative Action Employer M/F/D/V:
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, disability, veteran status, genetic information, sexual orientation, gender identity, or any other characteristic protected by law. *Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Quantum Research International, Inc.
  • Apply Now

  • * Fields Are Required
    About You:
    Contact Info: