[Close] 

Cyber Security Analyst

Responsibilities The successful candidate must be well-versed in security operations, cybersecurity tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Duties and responsibilities may include, but are not limited to: Monitor various security tools (e.g., Splunk, Splunk Enterprise Security, Palo Alto Networks, SourceFire, Cisco ASA) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of VA architecture and information systems are protected Use Splunk ES SIEM to respond to incidents detected on the VA network Reviewing and analyzing log files to report any unusual or suspect activities Use incident response use-case workflows to follow established and repeatable processes for triaging and escalating Generate trouble tickets and performing initial validation and triage to determine whether incidents are securityevents. Complete investigations in to identified cyberevents and hand over as appropriate Follow established incident response procedures to ensure proper escalation, analysis and resolution of security incidents Develop and maintain Incident Response procedures and Security SOPs. Analyze and correlate incident event data to develop preliminary root cause and corresponding remediation strategy Communicate effectively to all customers and stakeholders Work with other contract teams to effectively respond to cyber incidents Provide technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the VA network, and assessments for High Value Assets Qualifications Bachelor's Degree or higher in Computer Science, Electronical Engineering or other engineering or technical discipline and at least 10 years IT experience. Eight (8) years of additional relevant experience may be substituted for education. Certification (or ability to obtain certification within 120 days) in at least one of the following areas: 1) GIAC Certified Intrusion Analyst (GCIA), 2) GIAC Certified Incident Handler (GCIH), 2) Certified Ethical Hacker (CEH) Experience with advanced cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks In-depth understanding of NIST SP 800-61, US CERT and Office of Management and Budget (OMB) standards Experience interpreting and implementing cybersecurity regulations Excellent verbal communication skills Outstanding written skills for preparing reports and briefings Excellent analytical and problem solving skills This position may support a government contract and have access to classified or government protected information for which US citizenship is required Ability to obtain a Public Trust clearance 2018-1704
Salary Range: NA
Minimum Qualification
11 - 15 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.