Intermediate Data Analyst
Fairmont, WV, USA
SiloSmashers
From day 1, SiloSmashers set out to change how government agencies and corporations manage programs — and smash silo operations.SiloSmashers is seeking Data Analyst to support our federal law enforcement client.
The Data Analyst performs a variety data, analytical and security duties that are necessary to run an organization efficiently.
Responsibilities include:
- Coordinate with the CyWatch Government Team Lead (GTL) to ensure problem solution and appropriate training.
- Provide technical and administrative guidance for personnel performing tasks, including the review of work products for correctness, adherence to user standards, review of documentation to assure Government standards / requirements are adhered to.
- Provide short or long-term support as directed by the GTL in furtherance of the CyWatch mission.
- Cooperate with the Government and a new contract during that new contractor's transition - in activities at the end of this Order's period of performance.
Additional responsibilities include:
- Perform data management as directed.
- Review and process complaint data as directed, including cyber threats; those actionable via the financial fraud kill chain; and other high-priority matters.
- Maintain distribution lists for situational awareness reporting, sharing, and coordinating information across OGAs, and other external interested parties utilizing unclassified and classified systems as directed.
- Transfer data between client enclaves with the approval of the GTL when transferring from an enclave of higher classification to an enclave of lower classification and in accordance with established Data Transfer Officer (DTO) procedures.
- Follow client policies to include procedures that execute the duties of the watch.
- Identify improvements to watch floor processes.
- Coordinate cyber threats and incidents with other Federal cyber centers, CyD, client FOs, the intelligence, and Law Enforcement (LE) communities, and internally within the client, as directed.
- Participate in a cross Government cyber community that involves state, local, and Federal LE and the Intelligence Community (IC) and coordinate internally with other Federal cyber centers regarding ongoing CyWatch priorities and activities, cyber incidents, and investigations as directed.
- Monitor multiple communications nodes on client unclassified and classified enclaves based on computer notification and information sharing applications; multiple telephonic communications circuits; other inter-and-intra-agency communications systems for reports concerning cyber centric advisories, threats, and attacks.
- Monitor multiple communication nodes for updates concerning previously reported threats, incidents, and advisories.
- Provide research and basic analysis using multiple communication nodes as directed.
- Maintain situational awareness of emerging and/or developing threats, cyber incidents, identification of cyber victims, open-source media for client cyber priorities, supporting ongoing client investigations and intelligence activities.
- Respond to preliminary cyber threat information pursuant to established procedures.
- Provide primary assessments on cyber incidents as they come to the attention of the watch floor to prioritize and properly administer them pursuant to established procedures.
- Provide all-source analytical support to augment monitoring activities, critical technical collection and the development of preliminary analytical conclusions and reporting -- this includes using available client and open-source resources and systems to provide and enhance threat information for incidents that are germane to client interests.
- Provide additional information, for each incident that is of value, to the units that will handle the incident.
- Receive preliminary threat information (cyber and others deemed necessary to the client's mission).
- Provide all-source situational awareness and reporting for developing threats, cyberattacks, and ongoing federal agency cyber centric responses.
- Utilize the CyWatch tracking systems pursuant to established procedures.
- Maintain situational awareness of developing threats, cyber-attacks, and ongoing Federal agency cyber centric responses.
- Prepare and deliver CyWatch products as directed including documentation preparation, writing, editing, and production coordination and graphics of CyWatch products.
- As directed, perform closed source research utilizing client internal systems as well as other IT systems to which the client has access in its role as a member of the IC.
- Maintain daily logs pursuant to established procedures.
- Maintain daily logs of phone calls pursuant to established procedures.
- Maintain daily logs of in-person meetings pursuant to established procedures.
- Assist in the formulation of replies, responses, and further disseminations of threat information received.
- Transfer data to the appropriate system of record.
- Perform open-source research as directed.
- Assist with documentation preparation.
- Participate in briefings as directed in client and other Federal agencies and departments in relation to current cyber threats, incidents, or investigations.
- Complete any mandatory trainings as indicated by the GTL.
Qualifications:
- Active Top-Secret Clearance with the ability to obtain SCI and successfully pass a CI-Polygraph Examination
- Bachelor's degree from an accredited university or college with two (2) years or more of data analysis experience.
- Educational requirement may be waived if the candidate has five (5) or more years of experience.
- Two (2) years Microsoft Office Suite, SharePoint, Microsoft Access, and Adobe Acrobat.
Competence to review, interpret, and evaluate documents
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Job stats:
0
0
0
Category:
Analyst Jobs
Tags: Clearance Monitoring Polygraph SharePoint
Region:
North America
Country:
United States
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.
Information Systems Security Officer jobsInformation System Security Officer jobsInformation Security Manager jobsSenior Cloud Security Engineer jobsInformation Security Officer jobsSenior Cybersecurity Engineer jobsSenior Network Security Engineer jobsIT Security Engineer jobsCyber Security Specialist jobsSenior Information Security Analyst jobsSystems Engineer jobsSystems Administrator jobsSecurity Consultant jobsSecurity Specialist jobsIT Security Analyst jobsSenior Cyber Security Engineer jobsChief Information Security Officer jobsInformation System Security Officer (ISSO) jobsInformation Systems Security Engineer jobsSenior Penetration Tester jobsThreat Intelligence Analyst jobsStaff Security Engineer jobsSecurity Operations Analyst jobsSenior Information Security Engineer jobsSenior Product Security Engineer jobs
Java jobsTop Secret jobsMalware jobsGDPR jobsSplunk jobsEDR jobsSaaS jobsForensics jobsRMF jobsIDS jobsSDLC jobsBash jobsSQL jobsIPS jobsDoDD 8570 jobsIntrusion detection jobsThreat detection jobsActive Directory jobsFinance jobsCompTIA jobsGIAC jobsCRISC jobsITIL jobsTerraform jobsDocker jobs
OWASP jobsClearance Required jobsSANS jobsHIPAA jobsIndustrial jobsSOC 2 jobsOSCP jobsCCSP jobsUNIX jobsPolygraph jobsVPN jobsBanking jobsAnsible jobsTCP/IP jobsJavaScript jobsData Analytics jobsDNS jobsSOX jobsSAP jobsIT infrastructure jobsNIST 800-53 jobsSOAR jobsCISO jobsJira jobsMachine Learning jobs