Logo
ESC, Inc

Cyber Security Analyst (Cyber Intelligence Analyst) Job at ESC, Inc in Annapolis

ESC, Inc, Annapolis Junction, MD, US


Job Description

Job Description
3 Site Locations:  Annapolis Junction, MD Primary - JBAB Secondary - Landover, MD Third

Position requires a current/active TS/SCI
 LevelDegree/Years’ Experience2Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree.
Responsibilities
The Cyber Security Analyst (Cyber Intelligence Analyst) will be responsible for the following but not limited to:
  • Coordinates across the enterprise to make sure network security devices are being monitored and are receiving or generating alerts.
  • Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
  • Configures, installs, maintains and upgrades server applications and hardware. 
  • Evaluates, tests, recommends, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software.
  • Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security.
  • Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
  • Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
  • Working as expert, conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks.
  • Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
  • Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and open-source information.
  • Correlates threat data from various sources.
  • Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations.
  • Collects data using a combination of standard intelligence methods and business processes.
  • Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.

Qualifications
  • Requires a BS/BA with 2-4 years, MS/MA with 0-2 years or no bachelor's degree and 8-10 years of relevant work experience
  • Proven experience provisioning, patch management and configuration management activities for all security devices
  • Device monitoring of Tiered alerts for all operational networks
  • Proven experience in Lifecycle management of all security devices including tech refresh recommendations
  • COTS technologies used in a Cybersecurity Operations Center environment
  • Support to security incident resolution
  • Must have a current DoD 8570.1-M IAT Level II certification (i.e., Security+ CE)

 

Powered by JazzHR

qtxACKhLEr