ESC, Inc.
Cyber Security Analyst (Cyber Intelligence Analyst)
ESC, Inc., Washington, District of Columbia 20036
3 Site Locations: Annapolis Junction, MD Primary - JBAB Secondary - Landover, MD Third Position requires a current/active TS/SCI Level Degree/Years’ Experience 2 Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree. Responsibilities The Cyber Security Analyst (Cyber Intelligence Analyst) will be responsible for the following but not limited to: Coordinates across the enterprise to make sure network security devices are being monitored and are receiving or generating alerts. Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle). Configures, installs, maintains and upgrades server applications and hardware. Evaluates, tests, recommends, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software. Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security. Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security. Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks. Working as expert, conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and open-source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials. Qualifications Requires a BS/BA with 2-4 years, MS/MA with 0-2 years or no bachelor's degree and 8-10 years of relevant work experience Proven experience provisioning, patch management and configuration management activities for all security devices Device monitoring of Tiered alerts for all operational networks Proven experience in Lifecycle management of all security devices including tech refresh recommendations COTS technologies used in a Cybersecurity Operations Center environment Support to security incident resolution Must have a current DoD 8570.1-M IAT Level II certification (i.e., Security CE)