International Executive Service Corps
Cyber Defense Analyst
International Executive Service Corps, Nashville, Tennessee, United States,
Spectra Tech
is in need of a
Cyber Defense Analyst
for a position in Oak Ridge, TN.
Job Description:
This is a 12-month contract with one option year. This position will work a hybrid schedule (onsite one week per month at Y12 and Telework). The Cyber Defense Analyst must have at least an active L clearance (Q is preferred). Pantex is looking for levels 4 – 6 CDAs.
Knowledge, Skillset, and Abilities (KSAs):
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources; develop content for cyber defense tools.
Document and escalate incidents (including event history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack; perform cyber defense trend analysis and reporting.
Provide daily summary reports of network events and activity relevant to cyber defense practices.
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.
Use cyber defense tools for continual monitoring and analysis of system activity to identify potential malicious activity.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.
Identify applications and operating systems of a network device based on network traffic.
Reconstruct a malicious attack or an activity utilizing network traffic.
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected security incidents and communicate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
Essential Job Functions:
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected security incidents and communicate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
Educational Requirements:
Need at least an Associates (10-15 years experience). Experience Level: Minimum PhD – 2 to 5 years or more experience, Masters 5 to 10 years or more experience, Bachelors 10 to 15 years or more experience, and Associates 15 to 20 years or more experience.
#J-18808-Ljbffr
is in need of a
Cyber Defense Analyst
for a position in Oak Ridge, TN.
Job Description:
This is a 12-month contract with one option year. This position will work a hybrid schedule (onsite one week per month at Y12 and Telework). The Cyber Defense Analyst must have at least an active L clearance (Q is preferred). Pantex is looking for levels 4 – 6 CDAs.
Knowledge, Skillset, and Abilities (KSAs):
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources; develop content for cyber defense tools.
Document and escalate incidents (including event history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack; perform cyber defense trend analysis and reporting.
Provide daily summary reports of network events and activity relevant to cyber defense practices.
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.
Use cyber defense tools for continual monitoring and analysis of system activity to identify potential malicious activity.
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.
Identify applications and operating systems of a network device based on network traffic.
Reconstruct a malicious attack or an activity utilizing network traffic.
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected security incidents and communicate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
Essential Job Functions:
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected security incidents and communicate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
Educational Requirements:
Need at least an Associates (10-15 years experience). Experience Level: Minimum PhD – 2 to 5 years or more experience, Masters 5 to 10 years or more experience, Bachelors 10 to 15 years or more experience, and Associates 15 to 20 years or more experience.
#J-18808-Ljbffr