AEITS / Datawiz / The Bowen Group / RMGS / GTSC Talent Solutions / USParalog 

Cybersecurity Operations Analyst III (INV2585647)

GTSC Talent Solutions

APPLY / LEARN MORE

Cybersecurity Operations Analyst III

Location: Washington, D.C.

Clearance: TS/SCI with the ability to obtain and maintain a CI polygraph

Requirements:

  • Bachelor’s degree from an accredited institute in an area applicable to the position; an additional 4 years of experience be substituted in lieu of a degree
  • Minimum six (6) years of relevant experience in addition to education level
  • Must possess current DoD 8570 IAT II or IAM II certification
  • Experience working in a DoD or IC environment desired
  • Current active TS/SCI clearance, with the ability to obtain and maintain a CI polygraph

Job Details:

  • Performs forensic analysis of digital information and gathers and handles evidence
  • Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues
  • Performs data analysis and evidence collection and assess and mitigate threats, both past present and future
  • May use programming skills to help reverse engineer malicious code and help create fixes for vulnerable applications or services on the network
  • Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action
  • Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches
  • Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality
  • Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders
  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, IDS logs) to identify possible threats to network security
  • Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed
  • Investigate phishing and other user self-identified potential cyber threats
  • Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
  • Correlate incident data to identify specific vulnerabilities and make recommendations
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices
  • Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents
  • Conduct cyber trend analysis as well as malware analysis
  • Identify and analyze anomalies in network traffic using metadata
  • Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
  • Track incidents thoroughly and communicate with end users and management effectively
  • Participate regularly in working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives
  • Evaluate the current Computer Security Incident Response Capability (CSIRC) to ensure compliance with federal mandates for incident response and reporting
  • Maintain CSIRC specific Standard Operation Procedures and Incident Response Plans

Equal Opportunity Employer/Veteran/Disabled

APPLY / LEARN MORE

Leave a Comment