Jun 25
Secret
Entry Level (less than 2 yrs experience)
$70,000 - $80,000
Occasional travel
IT - Security
Fort Belvoir, VA (On-Site/Office)
Breakpoint Labs is seeking a highly motivated, self-starter to serve in the capacity of a Cybersecurity Analyst within a fast-paced Cybersecurity Services Provider (CSSP) environment. The position will be on-site due to the classified work, and the site location is Fort Belvoir, VA. A DoD Secret clearance will be accepted, but the ability to be cleared for a Top Secret is required.
Position Responsibilities:
- Conduct continuous network monitoring and analysis using various defensive cyber tools
- Enumerate vulnerable terrain in support of Tier 1 reporting.
- Provide end customers with vulnerability assessment reports with tailored, prioritized mitigation actions.
- Track vulnerability management efforts from identification, to notification, to remediation.
- Investigate and report potential false positives from continuous monitoring tools.
- Analyze risk score trends and ascertain potential root causes to risk score anomalies.
- Track compliance trends and provide prioritized list of findings to end customers.
- Assist subscribers in the deployment of Nessus agents.
- Enumerate and report instances of specific platforms, installed software, and services (including unauthorized instances).
- Validate network scanning quality and compliance IAW applicable JFHQ-DODIN TASKORDS.
- Troubleshoot credentialed vulnerability scanning failures and provide remediation guidance.
- Research emerging threats and vulnerabilities to aid in the identification of network security risks.
- Assist in incident response activities by querying existing data and sharing matching indicators of compromise (IOC).
- Conduct user activity monitoring (UAM) in support of the Insider Threat Program.
- Provide prompt, quality customer service with excellent written and oral communication skills.
- Provide direct support to the Protect Team Lead.
- Experience with Tenable Security Center/Assured Compliance Assessment Solution (ACAS) strongly preferred.
- Knowledge of network scanning principles and the potential impacts of intrusion detection/prevention systems (IDS/IPS) to scan data accuracy.
Required Experience:
- Knowledge in Evaluator Scoring Metrics (ESM) criteria.
- Experience working in a fast-paced, metrics-driven, and team-oriented environment.
- Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings.
-
Certifications Required: Security+ Continuing Education (CE) [CompTIA] AND, Certified Ethical Hacker (CEH) [EC-Council]
Clearance Required: DoD Secret Security Clearance. PLEASE NOTE: The position will require a Top Secret clearance, so the ability to be processed and granted a Top Secret clearance is required.
Education Requirements: Bachelor’s Degree in Computer Science, or related field of study.
Position Responsibilities:
- Conduct continuous network monitoring and analysis using various defensive cyber tools
- Enumerate vulnerable terrain in support of Tier 1 reporting.
- Provide end customers with vulnerability assessment reports with tailored, prioritized mitigation actions.
- Track vulnerability management efforts from identification, to notification, to remediation.
- Investigate and report potential false positives from continuous monitoring tools.
- Analyze risk score trends and ascertain potential root causes to risk score anomalies.
- Track compliance trends and provide prioritized list of findings to end customers.
- Assist subscribers in the deployment of Nessus agents.
- Enumerate and report instances of specific platforms, installed software, and services (including unauthorized instances).
- Validate network scanning quality and compliance IAW applicable JFHQ-DODIN TASKORDS.
- Troubleshoot credentialed vulnerability scanning failures and provide remediation guidance.
- Research emerging threats and vulnerabilities to aid in the identification of network security risks.
- Assist in incident response activities by querying existing data and sharing matching indicators of compromise (IOC).
- Conduct user activity monitoring (UAM) in support of the Insider Threat Program.
- Provide prompt, quality customer service with excellent written and oral communication skills.
- Provide direct support to the Protect Team Lead.
- Experience with Tenable Security Center/Assured Compliance Assessment Solution (ACAS) strongly preferred.
- Knowledge of network scanning principles and the potential impacts of intrusion detection/prevention systems (IDS/IPS) to scan data accuracy.
Required Experience:
- Knowledge in Evaluator Scoring Metrics (ESM) criteria.
- Experience working in a fast-paced, metrics-driven, and team-oriented environment.
- Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings.
-
Certifications Required: Security+ Continuing Education (CE) [CompTIA] AND, Certified Ethical Hacker (CEH) [EC-Council]
Clearance Required: DoD Secret Security Clearance. PLEASE NOTE: The position will require a Top Secret clearance, so the ability to be processed and granted a Top Secret clearance is required.
Education Requirements: Bachelor’s Degree in Computer Science, or related field of study.
group id: 90987816