APPLY / LEARN MORE
Cybersecurity Operations Analyst II
Location: Washington, D.C.
Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph
Job Details:
- Performs forensic analysis of digital information and gathers and handles evidence
- Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues
- Performs data analysis and evidence collection and assess and mitigate threats, both past present and future
- May use programming skills to help reverse engineer malicious code and help create fixes for vulnerable applications or services on the network
- Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action
- Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches
- Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality
- Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders
- Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, IDS logs) to identify possible threats to network security
- Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed
- Investigate phishing and other user self-identified potential cyber threats
- Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
- Correlate incident data to identify specific vulnerabilities and make recommendations
- Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices
- Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents
- Conduct cyber trend analysis as well as malware analysis
- Identify and analyze anomalies in network traffic using metadata
- Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
- Track incidents thoroughly and communicate with end users and management effectively
- Participate regularly in working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives
- Evaluate the current Computer Security Incident Response Capability (CSIRC) to ensure compliance with federal mandates for incident response and reporting
- Maintain CSIRC specific Standard Operation Procedures and Incident Response Plans
Requirements:
- Bachelor’s degree from an accredited institute in an area applicable to the position; an additional 4 years of experience be substituted in lieu of a degree
- Minimum four (4) years of relevant experience in addition to education level
- Must possess current DoD 8570 IAT II or IAM II certification
- Experience working in a DoD or IC environment desired
- Current active TS/SCI clearance, with the ability to obtain and maintain a CI polygraph
Equal Opportunity Employer/Veteran/Disabled