Cyber Defense Analyst Level 3 – TS/SCI w/Poly - TX

United States-Texas-San Antonio-20362-SAT

Amentum

Explore Amentum's commitment to global government and private-sector solutions. Learn about our global mission to drive mission success.

View all jobs at Amentum

Apply now Apply later

Cyber Defense Analyst Level 3 – TS/SCI w/Poly - TX - (CIS000329) 

Your Impact:

 

Are you interested in using your skills to help shape the Cyber, Security, & Intel space?  If so, look no further.  We are seeking a Cyber Defense Analyst to join our team of passionate individuals.  In this role you will support challenging, mission-critical projects that make a direct impact on the nation’s security and intelligence mission.  

You will use information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. 
Identify, triage, and report events that occur in order to protect data, information systems, and infrastructure. Find trends, patterns, or anomaly correlations utilizing security-relevant data. Recommend proactive security measures. Conduct analysis to isolate indicators of compromise. Notify designated managers, cyber incident responders, and cybersecurity service provider team member of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.

Responsibilities: 

  • Use cyber defense tools to monitor, detect, analyze, categorize, and perform initial triage of anomalous activity.
  • Generate cybersecurity cases (including event’s history, status, and potential impact for further action) and route as appropriate.
  • Leverage knowledge of commonly used network protocols and detection methods to defend against related abuses.
  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
  • Perform advanced manual analysis to hunt previously unidentified threats
  • Conduct PCAP analysis.
  • Identify cyber-attack phases based on knowledge of common attack vectors and network layers, models and protocols.
  • Apply techniques for detecting host- and network-based intrusions.
  • Working knowledge of enterprise-level network intrusion detection/prevention systems and firewall capabilities.
  • Understand the foundations of a hardened windows network and what native services and protocols are subject to abuse (such as RDP, Kerberos, NTLM, WMI, and SMB).
  • Familiarity with fragmentation of network traffic and how to detect and evaluate fragmentation related attacks in raw packet captures.
  • Conduct network – traffic, protocol and packet-level – and netflow analysis for anomalous values that may be security-relevant using appropriate tools (such as Wireshark, tshark, tcpdump).
  • Understand snort filters and how they are crafted and tuned to feed IDS alerting.
  • Understand system and application security threats and vulnerabilities to include buffer overflow, SQL injection, race conditions, covert channel, replay and return-oriented attacks, malicious code, and malicious scripting.
  • Analyze malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Familiar with indications of Command and Control (C2) channels and what strategies attackers use to bypass enterprise defenses from a compromised host.
  • Demonstrate advanced knowledge of how adversaries penetrate networks and how those attacks map to detectable events across the ATTACK framework.
  • Understand how VBS, Jscript, and Powershell can be maliciously used within a network and what level of monitoring and auditing is required to detect.
  • Possess deep knowledge of active directory abuse used by attackers for lateral movement and persistence.
  • Provide expertise in the identification of adversarial Tactics, Techniques, and Procedures (TTPs) and in the development and deployment of signatures.
  • Perform after-action reviews of team products to ensure completion of analysis.
  • Lead and mentor team members as a technical expert.

 

Here's What You'll Need:

 

Requirements:

  • Eight (8) years of demonstrated experience as a CDA in programs and contracts of similar scope, type, and complexity is required. A technical bachelor’s degree from an accredited college or university may be substituted for two (2) years of CDA experience on projects of similar scope, type, and complexity
  • Two (2) years of demonstrated and practical experience in TCP/IP fundamentals
  • Two (2) years of demonstrated experience with Bricata, tcpdump or Wireshark
  • Three (3) years of demonstrated experience using security information and event management suites (such as Splunk, ArcSight, Kibana, LogRhythm)
  • Three (3) years of demonstrated experience in network analysis and threat analysis software utilization
  • Three (3) years of demonstrated experience maintaining or managing Cloud environments such as Microsoft Azure, Amazon Web Services (AWS), using tools like Microsoft Sentinel. 
  • Requires DoD 8570 compliance with CSSP Analyst baseline certification
  • Information Assurance Technical (IAT) Level I or Level II certification
  • Computing Environment (CE) certification. The CE certification requirements can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications.
  • Requires successful completion of the Splunk software training course “Fundamentals 1”.
  • Requires Global Information Assurances Certificate (GIAC) Global Certified Incident Handler (GCIH) certification, or Certified Intrusion Analyst (GCIA) certificate.  
  • ICS/SCADA certification similar to Global Industrial Cyber Security Professional (GICSP) certification OR Global Response and Industrial Defense (GRID) certification

Clearance Required: 

  • TS/SCI with Poly
 Amentum is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United States military veteran’s status, ancestry, sexual orientation, gender identity, marital status, family structure, medical condition including genetic characteristics or information, veteran status, or mental or physical disability so long as the essential functions of the job can be performed with or without reasonable accommodation, or any other protected category under federal, state, or local law. Learn more about your rights under Federal EEO laws and supplemental language at EEO including Disability/Protected Veterans  and Labor Laws Posters

Primary Location

: United States-Texas-San Antonio-20362-SAT

Job Posting

: Oct 22, 2024, 8:42:18 PM

Job

: Information Technology

Organization

: CMS

Job Type

: ExperiencedJob Classification: Fulltime-Regular

Work Locations

: 20362-SAT 3326 General Hudnell Dr  San Antonio 78226-2023Capabilities: Cyber
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: Active Directory Application security ArcSight Audits AWS Azure Clearance Clearance Required Cloud Compliance Cyber defense DoD DoDD 8570 Firewalls GCIA GCIH GIAC GICSP ICS IDS Incident response Industrial Intrusion detection Kerberos LogRhythm Monitoring NTLM PCAP PowerShell Privacy Red Hat SCADA Scripting Sentinel Snort Splunk SQL SQL injection TCP/IP TS/SCI TTPs Vulnerabilities Windows

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.