Cyber Security Fusion Analyst

2019 DISA HQ Fort George G. Meade MD

Apply now Apply later

This position will support GSM-O II Task Number 07 (TN07), which provides support to Joint Force Headquarters-DoD Information Network (JFHQ-DODIN).  JFHQ-DODIN provides network operations and defensive cyber operations support to the United States Cyber Command in support of the DoD.  The selected candidate shall provide analysis that provides 24 hours per day x 7 days per week x 365 days per year support JFHQ-DODIN Operations Center, providing command, control, and defensive cyber operations (DCO) functions across the Combatant Commands, Service Cyber Components, Agencies, and Field Activities in addition to 24/7 coordination with USCYBERCOM and other partner agencies.

Primary Responsibilities:

  • Leverage an array of network monitoring and detection capabilities (including netflow, custom application protocol logging, signature-based IDS, and full packet capture (PCAP) data) to identify cyber adversary activity.
  • Support the development of Cyber Fusion standard operating procedures (SOPs), and Cyber Fusion Framework and Methodology based on industry best practice and department of defense instruction, guidance, and policy.
  • Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface.
  • Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT, and open-source vulnerability information to ensure prioritized plans are developed.
  • Analyze and document malicious cyber actors TTPs, providing recommendations and alignment to vulnerabilities and applicability to the enterprise operational environment.
  • Discover adversary campaigns, anomalies and inconsistencies in sensor and system logs, SIEMs, and other data.
  • Analyze and track vulnerability disclosure program (VDP) incidents as it relates to intelligence reporting.
  • Identify, investigate and rule out system compromises, with the capacity to provide written analytic summaries and attack life cycle visualizations.
  • Provide risk assessments and recommendations based on analysis of technologies, threats, intelligence, and vulnerabilities.
  • Offer recommendations to adjust enterprise or tactical countermeasures to for threats impacting the DODIN.
  • Collect analysis metrics and trending data, identify key trends, and provide situational awareness on these trends.
  • Provide guidance regarding the use of OSINT techniques in the pursuit of investigatory requirements.
  • Perform quality assurance duties on behalf of JDOC leadership, ensuring that SIGACTs are compliant with JDOC policies, as well as ensuring that all information is captured before closure.

Required Qualifications:

  • Active DoD TS/SCI Clearance and eligible for polygraph.
  • DoDD 8570 IAT Level II Certification (SEC+, CySA, GICSD, etc.).
  • Bachelor’s degree in related discipline and 4-8 years of related experience.  Additional experience may be accepted in lieu of degree.
  • Experience working with members if the Intelligence Community and knowledge and understanding of Intelligence processes.
  • In-depth knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber threat/adversary methodologies.
  • Proficiency with datasets, tools and protocols that support analysis (e.g. Splunk, CMRS, VDP, passive DNS, Virus Total, TCP/IP, OSI, WHOIS, enumeration, threat indicators, malware analysis results, Wireshark, Arcsight, etc.).
  • Experience with Intelligence Community repositories (Pulse, TESTFLIGHT, etc.)
  • Experience with various open-source and commercial vendor portals, services and platforms that provide insight into how to identify and/or combat threats or vulnerabilities to the enterprise.
  • Proficiency working with various types of network data (e.g. netflow, PCAP, custom application logs).

Preferred Qualifications:

  • Experience with the DODIN and other DoD Networks.
  • Familiarity with DoD portals and tools (RAMs, IKE, JCC2, etc.)
  • Experience with proprietary OS Intelligence Sources (Mandiant, Recorded Future, Shodan, etc.)
  • Skilled in building extended cyber security analytics (Trends, Dashboards, etc.).
  • Demonstrated experience briefing Senior Executive Service (SES) and General Officer/Flag Officer (GO/FO) leadership.
  • Experience in intelligence driven defense and/or Cyber Kill Chain methodology.
  • IAT Level III or IAM Level II+III Certifications

GSMO

Original Posting Date:

2024-10-16

While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.

Pay Range:

Pay Range $81,250.00 - $146,875.00

The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.

Apply now Apply later
Job stats:  3  0  0
Category: Analyst Jobs

Tags: Analytics ArcSight Clearance Cyber Kill Chain DCO DNS DoD DoDD 8570 GSM IAM IDS Malware Monitoring NetOps OSINT PCAP Polygraph Risk assessment SHODAN SIEM Splunk TCP/IP TS/SCI TTPs Vulnerabilities

Perks/benefits: Equity / stock options

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.