Mid-Level NOSC Analyst

USA-MS-Stenis

Apply now Apply later

General information

Requisition # R58852 Locations USA-MS-Stenis Posting Date 03/03/2025 Security Clearance Required TS/SCI Remote Type Onsite Time Type Full time

Description & Requirements

Transform the future of federal services with ManTech! Join a vibrant, energetic team committed to enhancing national security and public services through innovative tech. Since 1968, we’ve partnered with Federal Civilian sectors to deliver impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite your career and drive change. Your journey starts now—innovate and excel with ManTech!

ManTech seeks a seeks a motivated, career and customer-oriented Mid-Level NOSC Analyst to join our team in Stennis, MS.

In this role you will provide daily management and oversight to a team of up to 40+ operators providing support for a network, cybersecurity and cloud operations and incident management on a 24x7x365 basis. You will provide advanced network monitoring, incident response, and system troubleshooting to ensure mission-critical IT infrastructure remains secure and operational. Analyze escalated issues, coordinate with cross-functional teams to resolve network and security incidents and support the implementation of cybersecurity measures in alignment with policies and standards. 

Responsibilities include, but are not limited to:  

  • Provide support analyzing network traffic and various log data to determine the status and/or threat/impact against the network, recommending appropriate countermeasures, facilitating the tracking, handling, and reporting of all network and cyber security events and computer incidents.  
  • Monitor, detect, scan, record, audit, analyze, report, remedy, coordinate, and track network and cyber security related events for customer networks, infrastructure, and endpoints.  
  • Conduct forensic analysis and detailed investigations of security incidents to determine the root cause and extent of compromise resolve this issue, develop and implement lessons learned to improve support 
  • Document analysis, findings, and actions in a case/knowledge management system.  
  • Provide guidance and support to other team members, including coaching and knowledge sharing to enhance their technical skills  
  • Support senior-level NOSC personnel with the creation and distribution of incident reports   
  • Participate in vulnerability assessments and penetration testing activities to identify and address potential security weaknesses  

   

Minimum Qualifications:  

  • 4+ four years of related experience with network and/or security operations to include, but not limited to, Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or , Network Operations Center (NOC), Security Operations Center (SOC), or Network Operations Security Center (NOSC).  
  • A Bachelor of Science degree in Information Security, Computer Science, or related field and a minimum of (6) six months experience (or equivalent experience) in one or more of the following areas: network and infrastructure operations & maintenance (O&M), computer network penetration testing/techniques; computer evidence seizure, computer forensic analysis, data recovery; computer intrusion analysis/incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices,  
  • Possess either a Certified Ethical Hacker (CEH) or a GIAC Certified Incident Handler (GCIH) and meet DoD 8570 and/or 8140 Level II or III as required by the government 
  • Experience with Incident Response; identifying, investigating, reporting and remediating  
  • Captures, protects, and retains digital forensic data and information maintaining proper legal chain of custody for legal and law enforcement activities  
  • Hands on experience with network monitoring and troubleshooting tools (i.e Splunk, HBSS, Nessus, etc.), researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption  
  • Proficiency in security incident response methodologies and best practices, familiarity with scripting languages (Python, PowerShell, etc.) for automation and data analysis, and an understanding of cloud platforms and their impact on SOC operations (e.g., AWS, Azure, GCP).

Preferred Qualifications:  

  • Possess one or more of the following certifications: DOD 8570 Industry Related Certification - CSSP Analyst, CSSP Infrastructure Support or CSSP Incident Responder, Penetration Testing, GIAC Certified Forensic Examiner (GCFE), GIAC Advanced Smartphone Forensics Certification (GASF)  

Clearance Requirements:   

  • Must have a current/active Top Secret/SCI clearance.
  • The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.

  

Physical Requirements:  

  • Must be able to work in an office environment and maneuver in data center and other IT equipment installation locations.  
  • Constantly operate a computer and other office productivity machinery, such as a calculator, copy machine and computer printer  
  •  Ability to lift and carry 75 lbs for distances up to 50 feet. 

ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with ManTech, please email us at careers@mantech.com and provide your name and contact information.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: Analyst Jobs

Tags: Analytics Automation AWS Azure CEH CERT Clearance Clearance Required Cloud Computer Science Data Analytics DoD DoDD 8140 DoDD 8570 Encryption Forensics GCFE GCIH GCP GIAC Incident response Intrusion detection IT infrastructure Monitoring Nessus NetOps Network security Pentesting PowerShell Python Scripting Security Clearance SOC Splunk Surveillance Top Secret TS/SCI Vulnerabilities

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.