Logo
ECS

Cyber Security Analyst

ECS, Fairfax, Virginia, United States, 22032


ECS is seeking a

Cyber Security Analyst

to work in our

Ft Gordon, GA

office.

As a leading provider of managed cybersecurity services, ECS provides a highly tailored and customized offering to each customer. Our team is responsible for protecting both our customers and corporate environment at ECS. Our mission is very broad, and our team is agile. We will look toward your unique skills to approach and solve problems in your own way. Whether engineering a system to address a technical hurdle, protecting customers data or consulting on a wide range of security topics. You are empowered to engage and lead across multiple groups.

Our mission is to defend U.S. Army assets and information and to meet Army Cyber Command (ARCYBER) requirements for hardening the endpoint, enabling near-real time visibility, autonomous threat sharing, and protective actions. The capabilities included in our solution are the most advanced endpoint security technologies, analytics, expertise, and process integrations Intel Security offers.

The Cyber Hunt and Threat Analysis team is seeking a motivated individual with strong technical competency that will research and implement detection measures using data from a wide spectrum of sources. The candidate will also perform opportunistic threat hunting and forensic analysis when required during incidents.

Minimum Top Secret clearance is required with SCI eligibility and IAT Level II certification prior to start date.

Compliance with DoD 8140 / 8570 IAT Level II certification prior to start date.

Qualifications:

Minimum 5+ years of comparable experience performing Incident Response, Forensics, Malware Analysis, or Penetration TestingMust be proficient in at least three of the following disciplines:

Network traffic analysis and host based log analysisComprehensive understanding of enterprise Endpoint security productsStatic and Dynamic malware analysisDisk and Memory forensicsPractical knowledge in at least one scripting or development language (e.g. PowerShell or Python).

Responsibilities:

Use Network and Host Based data to drive detection, monitoring, and response capabilitiesCreate detection analytics based off the MITRE ATT&CK Framework and other security frameworksPerform unique research on adversarial Tools, Techniques, and Procedures (TTPs)Provide assistance to the Army DCO teams in response to incidents by analyzing host behavior and IOC informationPerform static and dynamic malware analysis to feed Indicators of Compromise into the Incident Response processActive Top Secret ClearanceStrong written and verbal communication skillsStrong understanding of common enterprise technologiesAbility to convey extremely technical concepts to audiences with varying technical understanding