NetCentrics, a Haystax Company, is a leading provider of enterprise systems management, solutions engineering, applications development, information assurance, computer network defense and cybersecurity for The Department of Defense, Department of Homeland security and other federal agencies.
NetCentrics is looking for an experienced Watch Analyst to support our team in Washington, D.C. The Watch Analyst will be a key team member on this highly visible, critical program that bridges DoD and DHS programs, and will be joining a team of respected technical professionals. The NetCentrics team is not your average team, and we are definitely not your average company. We do mission critical work, we value our people, and we demonstrate it every day.
Come talk to us and learn more. We encourage our team members’ professional development, and actively support ongoing education, training and certifications.
This Watch Analyst (SOC) role is an on-call, part time floater position with a minimum of one shift per month.
- Support operational watch and situational awareness requirements for the United States Coast Guard CYBER Command CSOC. Provide situational awareness and readiness reporting for the CSOC to the USCG program leadership.
- Support coordination and information collection related to incidents, investigations, Task Orders, and other communications within DOD and DHS.
- Responsible for managing shift personnel to ensure proper coverage, standardized processes, develop and update documentation as required, and reporting.
- Provides guidance and work leadership to less-experienced technical staff members, and may have supervisory responsibilities.
- Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
- Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
- Maintain IDS signatures and policies.
- Be able to modify/add custom IDS policies and signatures to account for lack of monitoring in threat areas as warranted by threat changes, such as zero-day attacks. This includes the use of Sourcefire rules.
- Identify misuse, malware, or unauthorized activity on monitored networks.
- Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies.
- Minimum of 2 years' direct experience.
- Knowledge of industry accepted standards and best practices related to incident response operations.
- Demonstrated excellence in analytical and problem solving skills related to network, system, forensic and malware analysis.
- Experience with security technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls & Log Analysis, Security Event and Incident Management (SEIM), Antivirus, Network Packet Analyzers, Security Systems Manager, malware analysis, forensics tools, and reverse engineering.
- Demonstrated knowledge in information technologies to include computer hardware and software, operating systems, and networking protocols.
- Experience with Linux and Windows operating systems.
- Must be IAT II and CND A compliant (Sec+CE, CEH) or able to obtain within 90 days.
- Must have an active Top Secret/SCI clearance.
As a contingency to employment at NetCentrics, all candidates who are given offers must successfully pass a full background investigation including criminal history, education and employment verifications.
**In order to be considered for this position, you must apply directly through our careers site**
NetCentrics is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability or protected veteran status.