Cyber Security Analystother related Employment listings - Gunpowder, MD at Geebo

Cyber Security Analyst

Description
Job Description:
The Defense Group at Leidos is currently seeking a Cyber Security Analyst at APG.
This position provides Tier II Cyber Security Analysis to C5ISR Center Sustaining Base Network Assurance Branch (SBNAB) Defensive Cyber Operations (DCO) Security Operations Center (SOC).
Beyond advising and guiding technical matters, this position is tasked with driving implementation and adoption of new tools, research, capabilities, frameworks, and methodologies while ensuring those already in use are implemented, utilized properly, and improved.
Primary ResponsibilitiesoIdentify and offer solutions to gaps in capabilities and visibilityoPromote and drive research and implementation of automation and process efficienciesoIntermediate command line experience that includes chaining Unix utilities such as sed, awk, and grep together oIntermediate IDS (Snort, Suricata, Bro/Zeek, etc.
) creation and tuning, to include performing impact analysis on customer environments and review and correction of Tier I rules oAnalysis of alert traffic plus surrounding traffic to provide context to inform analysis oAbility to consume open and closed source and search indicators in customer data, then generate new IDS configurations for future detection oBasic hunt experience that includes sifting non-alert-based traffic and deriving meaningful results in the absence of corresponding OSINT oBasic vulnerability awareness and able to determine applicability to customer environments, using data to establish attack attempts and success/failure oMaintaining current threat awareness oAbility to analyses complex (multipacket, multi-vector, multi-exploit, large volume) traffic and derive meaningful conclusions oSelf-directed research, development, customization, or other contributions to process improvement oContinual enrichment of IDS and moderate ability to tune on the fly oAbility to self-educate with non-comprehensive or incomplete documentation on new concepts, protocols, and data formatsBasic QualificationsoRequire BS degree and 8 - 12 years of prior relevant experience in order to operate within the scope contemplated by the level.
Additional certifications and experience may be considered in lieu of degree.
o3
years' experience working in a SOC environmentoDoD 8570 IAT II certifications required prior to startingoAdvanced knowledge of solution development techniques and best practices related to demonstration, pilot, and test management and operations.
oDemonstrated advanced knowledge of industry accepted standards.
oDemonstrated experience with researching and fielding new and innovative technology;oMotivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic finding.
oStrong analytical and troubleshooting skills.
oMust be a US Citizen.
oCandidate must possess an active TS/SCI, or a Top Secret clearance with a current SSBI, and be eligible to obtain a TS/SCI clearance.
Preferred QualificationsoDeep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
oHands-on cybersecurity experience (Protect, Detect, Respond or Sustain) within a Computer Incident Response organization.
oDemonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
oMotivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
oFamiliarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
External Referral Bonus:
EligiblePotential for Telework:
Yes, 10%Clearance Level Required:
Top SecretTravel:
Yes, 10% of the timeScheduled Weekly Hours:
40Shift:
DayRequisition Category:
ProfessionalJob Family:
Cyber OperationsPay Range:
.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.