Members of this team are responsible for protecting our client, networks from cyber threats by actively monitoring for security anomalies, performing vulnerability assessments, and balancing security with business rules/needs. You’ll need past experience and understanding of the cyber security environment, common network and host-based attacks, attack methods, and network defense architecture; in addition, have previous experience working in a security operations environment, preferably in defense-related organizations. Applicants must also be familiar with Department of Defense (DoD) cyber security service provider (CSSP) requirements and their implementation.
As an IT Cyber Security Analyst, you will apply a variety of technical skills which include security event log analysis, endpoint forensic analysis, and vulnerability analysis. You will be accountable for conducting information risk assessments and audits to ensure that information systems and data are adequately protected and meet DoD cyber security requirements. In order to be effective, you will need to leverage knowledge and comprehensive understanding in using vulnerability scanners (Nmap/Nessus), intrusion detection systems (FireEye), firewalls (Palo Alto Networks), SEIM (Splunk or other) or other information security products. You will work with vendors, outside consultants, and other third parties to improve information security within the organization. You will also create dashboards and deliver metrics related to information security and cyber security operations.
Your specific responsibilities include:
- Under general supervision, perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
- Develop plans to safeguard computer configurations against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs.
- Perform system security reviews and tests and write formal reports and follow up advisory memos.
- Receive reports on security breaches and take appropriate action to minimize harm and liability.
- Monitor process and inspect system and network data for computer and network usage policy compliance, system integrity, and incident response. Interface with the Information System Security Manager (ISSM) to report incidents.
- Deliver educational information to system administrators and users. Participate in the development and documentation of information security standards, best practices and guidelines.
- Assist in the design of secure system and network architectures.
- Assist the Information Technology Department and Internal Audit in the development of appropriate criteria needed to assess the level of new/existing applications and/or technology infrastructure elements for compliance with enterprise security standards.
- Assist local area in applying best practices in securing the data and information systems under their control.
- Other duties may also be assigned.
To be successful in this position you will bring:
- Bachelor’s degree plus three years relevant experience, or a combination of education and relevant experience.
- DoD Cyber Security Workforce (CSWF) level II or higher technical certification(s).
- Has, or is eligible for, a DoD secret level clearance.
- Must be a U.S. citizen.
- Demonstrated knowledge and understanding of IT security trends and emerging technologies, and an ability to relate them to DIU and its objectives.
- Thorough and demonstrated knowledge of networking protocols, principles, and intrusion detection devices, including firewalls and VPNs.
- Fundamental architecture and configuration knowledge of desktop server and operating systems.
- Solid understanding of security issues, techniques, and solutions.
- Strong experience with debugging, troubleshooting, forensics and security utilities.
- Basic understanding of scripting language.
- In-depth knowledge of authentication protocols, encryption and other fundamental security technologies.
- Excellent written and verbal communication skills.
- High level of integrity and excellent judgment concerning proprietary and privacy issues.
In addition, preferred requirements include:
- knowledge of information security standards, with an emphasis on DoD and National Institute of Standards and Technology (NIST) cyber security standards, guidance, and special publications and their application in a technical operational environment.
- Technical skills in information security technologies including vulnerability scanning, log management, identity and access management, security monitoring and others.
- Experience in incident response, malware triage, log analysis, data correlation, scripting
- Demonstrated skill in analyzing and distilling complex requirements into actionable and understandable policy.
- Demonstrated ability to facilitate continuous improvements for a technical program
- Experience implementing, managing and reporting DoD OPORDs, WARNORDs and FRAGORDs
- CEH certification or CompTIA CSA equivalent
- Interpersonal Skills: Demonstrates the ability to work well with DIU colleagues and clients and with external organizations.
- Promote Culture of Safety: Demonstrates commitment to personal responsibility and value for environment, safety and security; communicates related concerns; uses and promotes safe behaviors based on training and lessons learned.