Intermediate Cyber Defense Analyst (Part-Time)

Chenega CorporationWashington, DC
10h$37 - $50

About The Position

Intermediate Cyber Defense Analyst (Part-Time) Washington, DC Are you ready to enhance your skills and build your career in a rapidly evolving business climate? Are you looking for a career where professional development is embedded in your employer’s core culture? If so, Chenega Military, Intelligence & Operations Support (MIOS) could be the place for you! Join our team of professionals who support large-scale government operations by leveraging cutting-edge technology and take your career to the next level! Chenega Systems (CS) provides federal agencies empowered solutions in Cybersecurity and Data Visualization. Our Subject Matter Experts offer decades of experience working in the federal marketplace and the data visualization environment. The Intermediate Cyber Defense Analyst is responsible for using data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments to mitigate threats.

Requirements

  • BS degree in Cybersecurity or a related discipline
  • 5+ years of experience in incident response and/or breach response
  • CompTIA PenTest+, CompTIA CySA+, EC-Council CEH or equivalent certification
  • Must be a US citizen.
  • Must be able to pass a Criminal and Financial Background Check prior to starting.
  • Knowledge of computer networking concepts and protocols, and network security methodologies.
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions.
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
  • Skill in collecting data from a variety of cyber defense resources.
  • Knowledge of network traffic analysis methods.
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation-sponsored).
  • Knowledge of cyber defense and vulnerability assessment tools and their capabilities.
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
  • Knowledge of how to use network analysis tools to identify vulnerabilities.
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
  • Skill in performing packet-level analysis.

Responsibilities

  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.
  • Use cyber defense tools for continual monitoring and analysis of systems to identify malicious activity.
  • Document and escalate incidents (including the event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on the system and information.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Conduct research, analysis, and correlation across a wide variety of source data sets (indications and warnings).
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
  • Perform cyber defense trend analysis and reporting.
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts.
  • Identify and analyze anomalies in network traffic using metadata.
  • Provide daily summary reports of network events and activity relevant to cyber defense practices.
  • Identify applications and operating systems of a network device based on network traffic.
  • Other duties as assigned.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service