Logo
iQuasar

iQuasar is hiring: Information Security Analyst in Bloomfield

iQuasar, Bloomfield, PA, US


iQuasar LLC is seeking to fill an Information Security Analyst position for our Customer in various locations. At iQuasar, we strive to provide the next generation of cutting-edge technologies. Our growth means exciting career opportunities for talented professionals in engineering, software development, and other key areas. We offer competitive compensation and benefits including Health, Vision, and Dental Insurance, a matching 401k plan, and other benefits given below, excellent training, and a vibrant working environment. Our employees are exceptional, giving us a competitive advantage by innovating solutions with a strong sense of mission and integrity. One of our clients in various locations needs a Information Security Analyst for a Full-time position. Position: Information Security Analyst Position Type: Full Time Location: Offutt Hill, McConnell, Hickam, Tinker, JBER AK,Barksdale, Ramstein, McGuire, Pittsburgh, Grissom,Eglin, Tyndall, JB Andrews, Beale,Scott, Sioux City, Pittsburgh, Rickenbacker, Forbes,Homestead, Key Field, McDill, JB Andrews,Seymour Johnson, McConnell, NAS JRB Ft Worth,Pease NH, Little Rock AR, Kirtland, Eielson,Wright-Patterson, Spangdahlem Travel: On site Clearance: Top Secret with the ability to obtain SCI Responsibilities: Investigate a diverse collection of network activities in cyberspace to determine essential MRT-C support designed for command, control, processes, and systems Develop a strategy to identify, evaluate, and minimize risks in the local cyberspace environment that are crucial for mission success. Create and implement strategies and techniques to merge and display relevant MRT-C based on essential systems and network services. Identify and analyze trends to define MRT-C requirements and provide guidance and alignment services. Assist with FMA-C, identifying, mapping, and developing a defense plan to safeguard MRT-C. Maintain databases to monitor systems, modify user boundaries, and create indexing to make searches easier Utilize classified and unclassified networks and information portals to create support and information distribution plans for mission activities Review and provide recommendations for establishing new or revised policies, procedures, objectives, and organizational design for the staff, as necessary Coordinate with local SMEs to resolve events and/or incidents. Brief supporting recommendations and Courses of Action. Define and perform vulnerability assessments leveraging threat analysis to scope and prioritize efforts. Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Coordinate with enterprise-wide cyber defense staff to validate network alerts. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate environmental impact. Perform cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. Degrees, Certifications, and Education Requirements: Bachelor's degree in Computer Science, Information System Engineering, Business, or related technical discipline in cybersecurity or information technology. Possess 3 years of combined experience in the following: Functional Mission Analysis in Cyberspace processes and associated mapping and defense of Mission-Relevant Terrain in Cyberspace. Information Technology (IT) cybersecurity principles, concepts, and methods to investigate, analyze, and respond to cyber incidents within a computer network environment or Enclave. IT security principles, policies, products and services to assess risk factors and advise on vulnerability to attack from a variety of sources (e.g., destructive programs/applications/ viruses, unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications. Commonly applied telecommunications principles, concepts, and methodologies, operating characteristics and capabilities of systems, media, equipment, and related software systems, processes, and procedures to assess the efficiency of operations and make recommendations involving equipment and system integrity. IAT Level II Certification (ex: CompTIA Security) in accordance with (IAW) DOD 8140 and AFMAN 17-1303. Possess and maintain a Top-Secret clearance with SCI eligibility for access to classified processing systems. Ability to communicate effectively, both orally and in writing. If you are interested in this position, please send me a copy of your latest resume at andrew.yaseeniquasar.com with the information requested below. Also, please let me know what time/number is best to call to discuss this great opportunity. In case you are not interested in this position, or this is not a right fit for you, please feel free to share this opportunity with your friends/networks or anyone you know who may be interested in this position. Thank you • Availability to start a new job • Best Rates • Contact Please don't hesitate to contact me for any question (s) you may have. All employment is decided on the basis of qualifications, merit, and business need. Regards, Andrew Yaseen Recruitment Professional iQuasar, LLC 6 Pidgeon Hill Drive, Suite 305, Sterling, VA 20165 andrew.yaseeniquasar.com Direct:(703) 349-5824 Main: (703) 962-6001 Ext. 626 www.iQuasar.com An Equal Opportunity Employer: iQuasar, LLC is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion/belief, national, social, or ethnic origin, disability, gender/gender identity, marital/partnership status, pregnancy, medical history or genetic information, family or parental status, or any other status protected by federal and state regulations.