Apex Systems
AS&W Tier 1 (Cyber Threat Analyst)
Apex Systems, Ashburn, Virginia, United States, 22011
Job#: 2047823Job Description:Apex Systems is seeking a Cyber Threat Analyst to join our client for a long-term contract position located in Ashburn, VA supporting a US Government program.
Overview:Position:
Cyber Threat AnalystLocation:
On-site, Ashburn, VAPay range:
$33-40/HrShift:
7 am – 7 pm Sunday – Tuesday, every other WednesdayClearance Required:
USC, ability to obtain a Public TrustDescription:We are seeking a
Cyber Threat Analyst
for this highly visible cyber security program supporting Customs and Border Protection (CBP) security operations center (SOC). CBP SOC is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.U.S. Citizenship
and ability to favorably pass a 5-year (BI) Background Investigation is required to begin work on the program.What you will do in this role:Conduct log analysis and triage in support of incident response.Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.Work with key stakeholders to implement remediation plans in response to incidents.Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.Flexible and adaptable self-starter with strong relationship-building skills.Strong problem-solving abilities with an analytic and qualitative eye for reasoning.Ability to independently prioritize and complete multiple tasks with little to no supervision.Emphasis on ability to succinctly and accurately capture technical details and summarize findings for less technical audiences.Required Qualifications for this role:Bachelor’s degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field.Minimum of two years of professional experience in incident detection, response and remediation.Minimum of one (1) but two (2) preferred years of specialized experience in one or more of the following areas:Email securityDigital media forensicMonitoring and detectionIncident ResponseVulnerability assessment and pen testCyber intelligence analysisExtensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations.Evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.Experience with aggregating and creating daily, weekly and monthly reports with emphasis on communication skills to accurately convey technical concepts to various audiences.Must have at least one of the following certifications:CompTIA Advanced Security Practitioner (CASP)CompTIA Cloud+CompTIA Network+CompTIA Security+CompTIA Linux+CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+CompTIA A+CompTIA Server+GSEC – Security EssentialsGCIH – Incident HandlerGCIA – Intrusion AnalystGCFA – Forensic AnalystGPEN – PenetrationGWAPT – Web Application Penetration TesterGCFE – Forensic ExaminerCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorCSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)ECIH – EC-Council Certified Incident HandlerCNDA – Certified Network Defense ArchitectPreferred Qualifications for this role:Ability to coordinate and communicate well with team leads and government personnel.Provide weekly status reports and requested documentation.Experience in cyber government, and/or federal law enforcement.Experience with the Cyber Kill Chain and MITRE ATT&CK framework.
#J-18808-Ljbffr
Overview:Position:
Cyber Threat AnalystLocation:
On-site, Ashburn, VAPay range:
$33-40/HrShift:
7 am – 7 pm Sunday – Tuesday, every other WednesdayClearance Required:
USC, ability to obtain a Public TrustDescription:We are seeking a
Cyber Threat Analyst
for this highly visible cyber security program supporting Customs and Border Protection (CBP) security operations center (SOC). CBP SOC is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to CBP networks through monitoring, intrusion detection and protective security services to CBP information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, various cloud environments, security devices, servers and workstations. The CBP SOC is responsible for the overall security of CBP Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.U.S. Citizenship
and ability to favorably pass a 5-year (BI) Background Investigation is required to begin work on the program.What you will do in this role:Conduct log analysis and triage in support of incident response.Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.Work with key stakeholders to implement remediation plans in response to incidents.Effectively investigate and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.Flexible and adaptable self-starter with strong relationship-building skills.Strong problem-solving abilities with an analytic and qualitative eye for reasoning.Ability to independently prioritize and complete multiple tasks with little to no supervision.Emphasis on ability to succinctly and accurately capture technical details and summarize findings for less technical audiences.Required Qualifications for this role:Bachelor’s degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field.Minimum of two years of professional experience in incident detection, response and remediation.Minimum of one (1) but two (2) preferred years of specialized experience in one or more of the following areas:Email securityDigital media forensicMonitoring and detectionIncident ResponseVulnerability assessment and pen testCyber intelligence analysisExtensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations.Evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.Experience with aggregating and creating daily, weekly and monthly reports with emphasis on communication skills to accurately convey technical concepts to various audiences.Must have at least one of the following certifications:CompTIA Advanced Security Practitioner (CASP)CompTIA Cloud+CompTIA Network+CompTIA Security+CompTIA Linux+CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+CompTIA A+CompTIA Server+GSEC – Security EssentialsGCIH – Incident HandlerGCIA – Intrusion AnalystGCFA – Forensic AnalystGPEN – PenetrationGWAPT – Web Application Penetration TesterGCFE – Forensic ExaminerCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorCSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)ECIH – EC-Council Certified Incident HandlerCNDA – Certified Network Defense ArchitectPreferred Qualifications for this role:Ability to coordinate and communicate well with team leads and government personnel.Provide weekly status reports and requested documentation.Experience in cyber government, and/or federal law enforcement.Experience with the Cyber Kill Chain and MITRE ATT&CK framework.
#J-18808-Ljbffr