Cyber Intrusion Analyst
1677 DISA-Pacific Ford Island HI, United States
Full Time Mid-level / Intermediate Clearance required USD 85K - 153K
We support 24/7 operations and shift assignments are based on both preference and contract requirements, so we ask our team members to remain flexible to potential shift modifications to meet minimum staffing requirements.
JOB DESCRIPTION:
Work closely with Government counterparts to provide guidance within the CND-SP area. Provide CND reports, trends, responses, mitigations, analysis & information dissemination. Provide C2 support, situational awareness support, and provide leadership & support for all CND applicable activities within Protect, Detect, Respond, and Sustain. Work as a technical leader within the CSSP Team, responsible for maintaining the integrity & security of enterprise-wide systems & networks. Provide technical leadership to CND Teams supporting security initiatives through predictive & reactive analysis, and by articulating emerging trends to leadership & staff.
PRIMARY RESPONSIBILITIES:
- Perform computer network incident detection, and response activities to detect, correlate, identify and characterize anomalous activity that may be indicative of threats to the enterprise.
- Monitor various security tools and applications for possible malicious activities, investigate any associated alerts or indicators, and develop recommendations for a course of action, including mitigation strategies as necessary.
- Conduct analysis of low-level (“low and slow”) events to identify unauthorized activity utilizing exploratory problem-solving or self-learning techniques.
- Conduct near real-time event triage and analysis, which can result in network traffic validations or a Mission Partner’s incident report.
- Utilize formal monitoring policies and procedures that include the appropriate use of DoD-approved network monitoring and traffic analysis tools to assist with identifying suspicious, anomalous, or overtly malicious network traffic on a 24/7/365 basis.
- Review and analyze available logs in a timely manner to detect intruders and notify Mission Partners of activity through a formal reporting process/pending an incident report.
- Apply, develop, tune, and distribute or optimize new and existing countermeasures or guidance to prevent or mitigate potential cyber event impacts when possible.
- Perform network traffic analysis utilizing raw packet data, net flow, IDS, IPS and custom sensor output, as it pertains to the cyber security of communications networks.
- Understand attack signatures, tactics, techniques, and procedures associated with advanced threats.
- Requires good technical writing skills as each event, including the associated analysis, are documented in a ticketing system for review and action.
- Requires excellent communication skills as we are collocated with our customer and regular face-to-face interaction is necessary throughout the day, as well as significant coordination and communication between team members.
BASIC QUALIFICATIONS:
- Must have an active DoD Top Secret clearance.
- Bachelor’s Degree and 4+ years of related experience; cyber courses/certifications or DISA customer experience may be substituted in lieu of degree.
- Current DoD 8570 IAT Level II Certification (e.g. Sec+ CE) or higher at time of start.
- Current DoD 8570 CSSP Analyst Certification (e.g. CEH, CySA+), or ability to obtain one within 180 days of starting.
- Experience working CND duties (e.g., Protect, Defend, Respond, and Sustain).
- Experience working with DoD / Government Leaders at all levels.
- Strong computing system knowledge, particularly networking, including a knowledge of communication protocols and familiarity with common computing security elements such as IDS/IPS systems and firewalls.
- Experience evaluating packet captures.
PREFERRED QUALIFICATIONS:
- Command Line Scripting skills (PERL, python, shell scripting) to automate analysis task.
- Knowledge of hacker tactics, techniques and procedures (TTP).
- Familiarity with computing security frameworks such as MITRE ATT&CK and Cyber Kill Chain.
- Monitoring of intrusion detection and computer defense appliances (Splunk, Elastic), applications, and analysis of associated alerts.
- Knowledge of advanced threat actor tactics, techniques, and procedures (TTP)
- Understanding of software exploits.
- Analyze packed and obfuscated code.
Original Posting Date:
2024-12-18While subject to change based on business needs, Leidos reasonably anticipates that this job requisition will remain open for at least 3 days with an anticipated close date of no earlier than 3 days after the original posting date as listed above.
Pay Range:
Pay Range $85,150.00 - $153,925.00The Leidos pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
Tags: CEH Clearance CND Cyber Kill Chain DISA DoD DoDD 8570 Exploits Firewalls GSM IDS Intrusion detection IPS MITRE ATT&CK Monitoring Perl Python Scripting Splunk Top Secret Top Secret Clearance
Perks/benefits: Equity / stock options Flex hours Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.