Monitoring Analyst - 2nd Shift

Beltsville, MD, United States

VETS, Inc.

Contact Veterans Enterprise Technology Solutions here, a government IT consultant serving commercial and federal clients across Washington DC.

View all jobs at VETS, Inc.

Apply now Apply later

Overview

Staffing Pros, a division of VETS Inc., is recruiting for a full-time Monitoring Analyst for the 2nd Shift onsite in Beltsville, MD. You must be able to support shift work. This position will support 2nd Shift which is Sunday – Thursday, 2:00 PM – 10:00 PM. This position requires an Active Secret Clearance.  

 

If you have additional questions not answered by the information contained within this posting, please contact our team directly at StaffingPros@vets-inc.com.

Responsibilities

  • Provide Monitoring support in a 24x7x365 environment.
  • Share in-depth knowledge and intelligence gained from cyber security events with stakeholders.
  • Protect against and prevent potential cyber security threats and vulnerabilities.
  • Monitor and analyze network traffic to identify potential security threats and vulnerabilities.
  • Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.
  • Provide response, technical assistance and expertise for significant cyber incidents, investigations, and related operational events.
  • Contribute to security policies, procedures, and documentation.
  • Conduct advanced analysis and recommend remediation steps.
  • Analyze network events to determine impact.
  • Develop and maintain analytical procedures to meet changing requirements.
  • Coordinate during all cyber incidents.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
  • Determine tactics, techniques, and procedures for intrusion sets.
  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.
  • Collaborate with cross-functional teams to ensure compliance with security standards and best practices.
  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
  • Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.

Qualifications

Required Qualifications:

  • Bachelor's degree and 2 years of relevant experience. Four (4) additional years of experience can be substituted in lieu of the degree requirement.
  • Possess ONE of the following certifications: A+ CE, CCNA-Security, CND, Network+ CE, SSCP, or Security+
  • Experience with Security Operations Center, network event analysis and/or threat analysis.
  • Knowledge of cloud computing technologies to include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
  • Knowledge of traditional computing technologies architecture, design, and security.
  • Expertise in usage of log aggregation and security analysis tools.
  • Demonstrated knowledge of the Incident Response Lifecycle and how it applies to cloud, legacy, and hybrid environments.
  • Ability to identify remediation steps for cybersecurity events.
  • Demonstrated ability to utilize and leverage host-based tools to assist in determining scope and severity of a cybersecurity incident.
  • Demonstrated strong organizational skills.
  • Can analyze common encoding and obfuscation types (Base64, Caesar cipher, junk data, etc) and recognize advance types (XOR, AES, etc)
  • Can examine and investigate common packet traffic and protocols.
  • Can analyze common attack types (Cross-site scripting, directory traversal, denial of service, etc) and identify more advanced types (Ex. novel CVE related attacks)
  • Proven ability to operate in a time sensitive environment.
  • Proven ability to communicate orally and written.
  • Proven ability to brief (technical/informational) senior leadership.
  • Ability to scope and perform impact analysis on incidents.
  • An active Secret security clearance
    • Ability to obtain a final Top Secret security clearance
  • Must be able to support 2nd Shift (Eves) which is Tuesday – Saturday, 2:00 PM – 10:00 PM. 

Preferred Qualifications:

  • Knowledge of network architecture, design, and security.
  • Ability to analyze static and dynamic malware analysis reports.
  • Ability to analyze and identify anomalous code as malicious or benign.
  • Skill in detecting host and network-based intrusions via intrusion detection technologies.
  • Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
  • Skill in conducting trend analysis.
  • Knowledge of adversarial tactics, techniques, and procedures.
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
  • Knowledge of system administration, network, and operating system hardening techniques.
  • Knowledge of packet-level analysis using appropriate tools.
  • Knowledge of intersection of on-premise and cloud-based technologies.
  • Knowledge of system design and process methodologies.
  • Ability to coordinate with enterprise-wide cyber defense staff to validate network alerts.
  • Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.

EEO Statement

Staffing Pros a division of VETS-inc is an Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities. The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0
Category: Analyst Jobs

Tags: AES C Clearance Cloud CND Compliance Cyber defense IaaS Incident response Intrusion detection Log files Malware Monitoring PaaS SaaS Scripting Security analysis Security Clearance SIEM SOC SSCP Top Secret Vulnerabilities XSS

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.