Cyber Security Watch Analyst – Day Shift 6am-2pm

Job ID
2017-2983
Experience (Years)
2
Security Clearance
TS/SCI
US-DC-

Job Description

 

NetCentrics, a Haystax Company, is a leading provider of enterprise systems management, solutions engineering, applications development, information assurance, computer network defense and cybersecurity for The Department of Defense, Department of Homeland Security and other federal agencies.

 

NetCentrics is looking for an experienced Cyber Security Incident Analyst [Security Operations Center (SOC)] to support our team in Washington, DC.  This position is open only to candidates with an active Top Secret security clearance and be SCI clearable. This position is for the day shift from 6am to 2pm.

 

The Cyber Security Watch Analyst will be a key team member on this highly visible, critical program that bridges DoD and DHS programs, and will be joining a team of highly respected technical professionals.  The NetCentrics team is not your average team, and we are definitely not your average company.  We do mission critical work, we value our people, and we demonstrate it every day.  Come talk to us and learn more.  We encourage our team members’ professional development, and actively support ongoing education, training and certifications.

 

 

Specific Areas of Responsibility:

 

  • Support operational watch and situational awareness requirements for the customer.
  • Provide situational awareness and readiness reporting for the program leadership.
  • Support coordination and information collection related to incidents, investigations, Task Orders, and other communications within DOD and DHS. 
  • Performs Computer Security Incident Response activities; coordinates with other government agencies to record, escalate and report incidents.
  • Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
  • Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
  • Be able to modify/add custom IDS policies and signatures to account for lack of monitoring in threat areas as warranted by threat changes, such as zero-day attacks. This includes the use of Sourcefire rules.
  • Identify misuse, malware, or unauthorized activity on monitored networks.
  • Analyze and solve problems related to network, system, forensic and malware analysis.
  • Evaluate firewall change requests and assess organizational risk.
  • Prepares incident reports of analysis methodology and results.
  • Support Contingency Operations (COOP) and Disaster Recovery (DR) as required.
  • Ensure documentation is updated and maintained.


Requirements:

 

  • Must have a Top Secret clearance and be SCI clearable.
  • Must be IAT II and CND-A compliant (S+, CEH) or complete in 90 days.
  • Two to four years of experience in Cyber Security.
  • Thorough understanding of DOD security policies and procedures (STIGs) and general incident response procedures (CJCSI 6510.01 or NIST 800-61)
  • Demonstrated excellence in analytical and problem solving skills related to network and system events/logs.
  • Knowledge of industry accepted standards and best practices related to incident response operations.
  • Demonstrated excellence in analytical and problem solving skills related to network and system.
  • Experience with security technologies including Intrusion Detection & Prevention Systems (IDS/IPS), Firewalls & Log Analysis, Security Event and Incident Management (SEIM), Antivirus, Network Packet Analyzers, Security Systems Manager, malware analysis, forensics tools, and reverse engineering.
  • Demonstrated knowledge in information technologies to include computer hardware and software, operating systems, and networking protocols.
  • Experience with Linux and Windows operating systems.
  • Knowledgeable on computer evidence seizure, computer forensic analysis, development and/or analysis, interpretation, and compliance with federal and agency IT security policies and regulations.
  • As a contingency to employment at NetCentrics, all candidates who are given offers must successfully pass a full background investigation including criminal history, education and employment verifications.

 

Desired Experience/Skillsets (Not required): 

 

  • Computer network penetration testing and techniques.
  • Experienced with static and malware analysis.
  • Experience with Linux and Windows operating systems.

 

**In order to be considered for this position, you must apply directly through our careers site**       

   

NetCentrics is an equal opportunity/affirmative action employer. All qualified applicants will receive consideration for employment without regard to sex, gender identity, sexual orientation, race, color, religion, national origin, disability, protected Veteran status, age, or any other characteristic protected by law.

 

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed