[Close] 

Computer Security Analyst

Serves as the expert which shall beresponsible for providing expertcyberthreat and intelligence technicalsupport to all sites listed in the place of performance.  The Advanced Cyber Threat Analyst II isrequired to provide expert technicalsupport to monitor, correlate, identify, analyze, mitigate, manage, track andsupportprocesses for allsecurity incidents.  The Advanced Cyber Threat Analyst II shall have knowledge of, andexperiencein, the following: 1. Cyber Security Policy and advanced cyber security threat mitigation at the Expert level 2. Advanced Cyber security tools, network topologies, intrusion detection, PKI, and secured networks 3. Implementation of cyber security regulations 4. Tracking all activity, insuring timely resolution of problems 5. Coordinating the development of advanced security signature or access control mechanisms that can be implemented on security systems such as intrusion prevention - detection systems, firewalls, routers or endpoint in response to new or observed threats within the enterprise 6. Leading the identification of advanced security systems and controls to ensure the monitoring and configuring of security appliances 7. Ensuring that Analysts receive and analyze alerts from various enterprise level sensors and determine possible causes of such alerts 8. Performing advanced analysis of adversary tradecraft, malicious code, and capabilities 9. Creating and leading processes that support the analysis of log files from a variety of enterprise level systems and sensors to include individual host logs, network traffic logs, firewall logs, and intrusion detection/prevention system logs 10. Identifying anomalous activity and potential threats to enterprise resources 11. Monitoring external and internal data sources in order to maintain enterprise threat conditions 12. Leading  the processes which support event correlation by using information gathered from a variety of system and sensor sources within the enterprise; 13. Managing the collection and advanced analysis of intrusion artifacts and using discovered data to enable mitigation potential of incidents within the enterprise. 14. Providing advanced networkevent analysis and intrusion analysis. Qualifications Bachelor's degree in Information Technology or Business  Minimum of six (6) years oof Information Technology experince, in addition to a minimum of four (4) years of advanced Cyber Threat Information experience  Must hold one of the following certifications: Certified Ethical Hacker (CEH) Certified Information Systems Auditor (CISA) GIAC Systems and Network Auditor (GSNA) GIAC Certified Incident Handler (GCIH) Certified Computer Security Incident Handler (CSIH) Excellent verbal communication skills Outstanding written skills for preparing reports and briefings Excellent analytical and problem solving skills Ability to obtain a DoD Secret security clearance U.S. Citizenship is required as is successfully passing a thorough Government background screening process requiring the completion of detailed forms and fingerprinting   2017-1631
Salary Range: NA
Minimum Qualification
5 - 7 years

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.