Computer Network Defense (CND) Analyst 3 (CCAs Accepted)

Annapolis Junction, Maryland

Wyetech

Wyetech is a computer engineering services company that is dedicated to providing high quality talent to solve our nation’s toughest problems. At Wyetech, we offer years of experience providing software services and solutions specializing in...

View all jobs at Wyetech

Apply now Apply later

At Wyetech, you’ll be at the center of an award-winning corporate culture, breaking technological barriers and solving real-world problems for our federal government customers. We are committed to hiring the best of the best, and in return, we offer a world-class, truly unique employee experience that is rare within our industry.
We are seeking a highly skilled Cyber Network Defense Analyst (CNDA) to join our team. The CNDA will be responsible for continuous network security monitoring, intrusion detection, and incident response actions. This role requires an individual with strong technical knowledge and experience in securing network infrastructure against known vulnerabilities, analyzing security incidents, and effectively communicating with internal and external stakeholders.
Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment.
Due to federal contract requirements, United States Citizenship and position appropriate security clearance is required. (e.g. Active TS/SCI security clearance with agency appropriate polygraph).

Capabilities

  • Continuously monitor network activity to detect and respond to potential security incidents
  • Conduct intrusion detection and incident response activities
  • Analyze correlated log data to identify potential threats or anomalies
  • Develop and implement custom Snort rules to enhance network intrusion detection capabilities
  • Recognize and differentiate between legitimate network activity and malicious intrusions or compromises
  • Analyze event logs and other relevant data to investigate successful intrusions and compromised systems
  • Communicate effectively with internal teams and external partners across various levels
  • Secure network gear by implementing appropriate measures to mitigate known vulnerabilities
  • Correlate forensic findings with network events to develop detailed intrusion narratives
  • Conduct forensic triage, analyzing the scope and potential impact of incidents
  • Collect, process, preserve, and analyze computer-related evidence
  • Collaborate with government and customer personnel to validate and investigate security alerts
  • Document and track incident analysis through resolution, providing detailed reports and findings

Required Qualifications

  • TS/SCI with agency appropriate poly
  • Ten (10) years of experience and an Associate's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
  • OR
  • Eight (8) years of experience and an Bachelor's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
  • OR
  • Six (6) years of experience and an Master's Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
  • OR
  • Four (4) years of experience and an Doctorate Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
  • 18 semester hours of military training/ coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree.
  • Relevant experience in network/system administration, vulnerability analysis, penetration testing, computer forensics, or military cyber defense training
  • Experience with cloud environments and automation tools to support cyber defense operations
  • Strong analytical skills to assess network vulnerabilities and propose mitigation strategies
  • Excellent verbal and written communication skills to share findings with stakeholders

Required Technical Skills

  • Proficiency in a wide array of network and information security tools
  • Strong understanding of modern computer systems, client/server, LAN/WAN, and network management/monitoring concepts
  • Ability to analyze data across multiple platforms (traditional networks, cloud, IoT)
  • Experience securing network hardware (routers, switches, servers, etc.) against vulnerabilities
  • Knowledge of intrusion detection systems, firewalls, and network logs
  • Ability to analyze and interpret logs to identify intrusions and distinguish between false positives
  • Experience with network forensics, vulnerability analysis, penetration testing, and computer forensics

Preferred Military Experience

  • 1D7X1A (Cyber Defense Operations - Network Defense)
  • 25D (Cyber Network Defender)
  • CTN, NEC 9308 (Cryptologic Technician Networks)
  • 1702 (Cyberspace Warfare Officer)
  • 1721 (Cyberspace Defensive Operator)
  • 1810 (Cryptologic Warfare Officer)
  • 1820 (Information Warfare Officer)
  • 17A (Cyber Operations Officer)
  • 17D (Cyberspace Operations Officer)

Desired Certifications

  • Certified Ethical Hacker (CEH)
  • GIAC Certified Incident Handler (GCIH)
  • Certified Information Systems Security Professional (CISSP)
  • CompTIA Cybersecurity Analyst (CySA+)
  • GIAC Certified Intrusion Analyst (GCIA)
  • Offensive Security Certified Professional (OSCP)

Desired Technical Tools

  • DATAEXPLORER CrowdStrike Falcon YARA Recorded Future
  • XKEYSCORE Carbon Black Cuckoo AlienVault OSSIM
  • ROCKSTAR SentinelOne OSQuery Metasploit
  • ZOOM Nessus FTK Nmap
  • BOMBASTICYAK OpenVAS EnCase Burp Suite
  • SNAPE QualysGuard Snort Python
  • SCOUT Palo Alto Networks SIFT Workstation PowerShell
  • DEVNAV Cisco ASA MISP Proofpoint
  • CDOT Fortinet FortiGate ELK Stack Mimecast
  • Clearvision AWS CloudTrail Xacta Suricata
  • VirusTotal LogRhythm ArcSight Bro/Zeek
  • Wireshark Tcpdump QRadar Splunk

The Benefits Package

  • Wyetech believes in generously supporting employees as they prepare for retirement. The company automatically contributes 20% of each employee's gross compensation to a Simplified Employee Pension (SEP) IRA, with no requirement for employee matching. All contributions are fully vested from day one, ensuring immediate ownership of retirement funds. 

  • Additional benefits include:
  • Wyetech provides a generous PTO plan of up to 200 hours annually, aligned with applicable state leave regulations. Employees have the flexibility to adjust their PTO allocation at the start of each calendar year, ensuring it meets their evolving needs.

  • Full-time employees have the option to participate in a variety of voluntary benefit plans including:
  • A Choice of Medical Plan Options, some with Health Savings Account (HSA)
  • Vision and Dental
  • Life and AD&D Benefits
  • Short and Long-Term Disability
  • Hospital Indemnity, Accident, and Critical Illness Insurances
  • Optional Identity Theft and Legal Protection Services

Company Environment & Perks

  • Employee Referral Bonus Eligibility up to $10,000 
  • Mobility Among Wyetech-supported Contracts 
  • Various contract and work locations throughout Maryland, Virginia, Colorado, Texas, Utah, Alaska, Hawaii and OCONUS
  • Various team-building events throughout the year such as: monthly lunches, summer company picnic, and an annual holiday party. 
  • Employees receive two complementary branded clothing orders annually.
Wyetech, LLC is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran. 
Affirmative Action Statement:Wyetech, LLC is committed to the principles of affirmative action in all hiring and employment for minorities, women, individuals with disabilities, and protected veterans.
Accommodations:Wyetech, LLC is committed to providing an inclusive and accessible hiring process. If you need any accommodations during the application or interview process, please contact David Schroeder, Jr. at 844-WYETECH x727 or staffing@wyetech.com. We are happy to provide reasonable accommodations to ensure equal access to all candidates.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  3  0  0

Tags: AlienVault ArcSight Automation AWS Burp Suite Carbon Black CEH CISSP Clearance Cloud CND CompTIA Computer Science CrowdStrike Cyber defense CySA+ ELK EnCase Firewalls Forensics GCIA GCIH GIAC Incident response Intrusion detection IoT LogRhythm Metasploit MISP Monitoring Nessus Network security Nmap Offensive security OpenVAS OSCP Pentesting Polygraph PowerShell Python QRadar Security Clearance Snort Splunk TS/SCI VirusTotal Vulnerabilities

Perks/benefits: Equity / stock options Health care Medical leave Salary bonus Startup environment Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.