This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. Use cyber defense tools for continual monitoring and analysis of the system to identify malicious activity. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Receive and analyze network alerts from various sources within the enterprise and determine probable causes of such alerts. Perform cyber defense trend analysis and reporting. Coordinate with enterprise-wide cyber defense staff to validate network alerts. Identify and analyze anomalies in network traffic using metadata. Provide daily summary reports of network events and activity relevant to cyber defense practices. Identify applications and operating systems of a network device based on network traffic. Be accessible via company phone and email 24/7 in case of emergency.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level
Education Level
No Education Listed