UIC Alaska

Cybersecurity Intrusion Detection Analyst

ID
2022-2966
Category
Information Technology
Position Type
Full-Time
Location : Location
US-OH-Dayton
Clearance Level Must Be Able to Obtain
Secret
Minimum Clearance Required
Secret
Travel Requirement
N/A

Overview

CYBERSECURITY INTRUSION DETECTION ANALYST (ERDC-22-0246-Z):

 

Bowhead is seeking Cybersecurity Intrusion Detection Analyst to join our team in Dayton, OH. The Cybersecurity Intrusion Detection Analyst use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts day or night.

Responsibilities

ESSENTIAL DUTIES:

  • Receive and distribute AS&W information;
  • Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions, maintain internal and external source location information);
  • Coordinate AS&W information from other sources to aid in analysis of alerts.
  • Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
  • Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
  • Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
  • Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
  • Collect intrusion artifacts (e.g., source code, malware, and trojans).
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B.
  • Provide a 24/7x365 event/incident handling and analysis capability;
  • Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
  • Analyze detected cyber events to identify incidents;
  • Categorize and characterize cyber incidents;
  • Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
  • Analyze cyber incidents to develop specific responses;
  • Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
  • Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
  • Mitigate operational and/or technical impact due to cyber incidents;
  • Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.

Qualifications

In accordance with Executive Order 14042: Ensuring Adequate COVID Safety Protocols for Federal Contractors, candidates should be aware that they may be required to have received or be willing to receive the COVID-19 vaccine by date of hire.

  • Must possess Bachelor's degree or equivalent experience.
  • Must have at least 5 years intrusion detection experience.
  • Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience.
  • Must have the certifications for DOD 8570 IAT Level II minimally.
  • Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
  • Must have the ability to earn DoD 8570 computing environment certification within 6 months.
  • Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience.
  • Ability to demonstrate strong knowledge of computer security concepts.
  • Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
  • Advanced knowledge of network technologies and protocols.
  • Advanced understanding of current threats and trends present in the Information Security and Technology field.
  • Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.

Physical Demands:
• Must be able to lift up to 25 pounds
• Must be able to stand and walk for prolonged amounts of time
• Must be able to twist, bend, and squat periodically

SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location. 

 

Link to Apply: https://protect-us.mimecast.com/s/ym--CZ6Rx3uPRBLzCKpJiSh?domain=rn21.ultipro.com

 

#LI-KC1

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed