[Close] 

Cyber Security Analyst (IR Monitoring & Handling) 2nd Shift

Company/Position Overview
Salient CRGT seeks a Cyber Security Analyst for one of our leading customers: Veterans Affairs. The successful candidate myst be well-versed in security operations, cyber security tools, intrusion detection, and secured networks.
He/she will serve as an expert and be responsible for providing network and security operations technical analysis, assessment and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring.
In this role, responsibilities include:
Monitoring various security tools (e.g., Splunk, Palo Alto Networks, SourceFire, Cisco ASA) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of VA architecture and information systems are protected
Reviewing and analyzing log files to report any unusual or suspect activities Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating
Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open source intelligence (OSINT)
Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents
Reporting incidents to US CERT and providing detailed information for use in after action reports
Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy
Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the VA network, and assessments for
High Value Assets
Supporting on-site Tuesday-Saturday during one of the following shift times: o 6AM ? 2:30PM o 2:00PM ? 10:30PM o 10PM ? 6:30AM
Mandatory Qualifications (Education, Certifications, Experience, Skills)
Education: Bachelors degree in computer science, electronics engineering or other engineering or technical discipline, 8 additional years of relevant experience may be substituted for education
Experience: 10 years of related experience
PWS Specified Certifications: Must have at least one of the following certifications (Or the ability to obtain one of the certification within 90 days of hire): GIAC Certified Intrusion Analyst; GIAC Certified Incident Handler (GCIH) or Certified Ethical Hacker (CEH)
Background Investigation: Must be able to pass and maintain a Government Background Investigation. U.S. citizenship is also required by law, regulation, executive order, or government contract for this particular position
Desired Qualifications (Education, Certifications, Experience, Skills)
Salient CRGT is a leading provider of health, data analytics, cloud, agile software development, mobility, cyber security, and infrastructure solutions. We support these core capabilities with full lifecycle IT services and training?to help our customers meet critical goals for pivotal missions. We are purpose-built for IT transformation supporting federal civilian, defense, homeland, and intelligence agencies, as well as Fortune 1000 companies.
If you feel you are qualified for this position, express interest by clicking the Apply button below (if you are viewing this position on the Salient CRGT website). If you are viewing this job posting outside of the Salient CRGT website, please visit: www.salientcrgt.com/careers to express interest in this position through the Salient CRGT Careers page.
Salient CRGT is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, age, sex, sexual orientation, gender identity or expression, veteran status, disability, genetic information, or any other factor prohibited by applicable anti-discrimination laws.



Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Cyber Security Analyst (Sensor Monitoring)
Hines, IL Dunhill Professional Search
Cyber Security Analyst (Sensor Monitoring) wit...
Hines, IL Dunhill Professional Search
Cyber Security Analyst
Glenview, IL Illinois Tool Works
Cyber Security Analyst
Chicago, IL Mitchell/Martin, Inc.
Cyber Security Analyst
Chicago, IL Mitchell/Martin, Inc.