Posted today
Top Secret/SCI
Early Career (2+ yrs experience)
Unspecified
No Traveling
IT - Networking
Stennis Space Center, MS (On-Site/Office)
TEKsystems is seeking a Cyber Network Defense Analyst (CNDA) to support a customer on site at Stennis Space Center in Mississippi.
Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs).
Primary Responsibilities:
- Manage and conduct hands-on technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team
- Guide and mentor peers and subordinates to provide cross training
- Ensure accountability and punctuality of security analysts assigned to your shift
- Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly)
- Articulate daily challenges to the Government Watch Officer (GWO)
- Analyze web and host logs for indications of compromise
- Remediate and coordinate the remediation of infected or compromised devices
- Ensure shift continuity during call-outs and emergencies
- Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events
- Document and update processes, workflows, and technical guides
- Perform simple firewall rule changes (after training)
Requirements:
- Active/current TS/SCI required to be considered.
- US Citizenship required
- Bachelor's Degree and 0-2 years of SOC analyst experience. Additional experience may be considered in lieu of a degree
- Extensive knowledge of a SOC’s/NOSC’s purpose and role within an organization
- Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
- Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
- Expertise with packet analysis tools such as Wireshark
Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs).
Primary Responsibilities:
- Manage and conduct hands-on technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team
- Guide and mentor peers and subordinates to provide cross training
- Ensure accountability and punctuality of security analysts assigned to your shift
- Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly)
- Articulate daily challenges to the Government Watch Officer (GWO)
- Analyze web and host logs for indications of compromise
- Remediate and coordinate the remediation of infected or compromised devices
- Ensure shift continuity during call-outs and emergencies
- Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events
- Document and update processes, workflows, and technical guides
- Perform simple firewall rule changes (after training)
Requirements:
- Active/current TS/SCI required to be considered.
- US Citizenship required
- Bachelor's Degree and 0-2 years of SOC analyst experience. Additional experience may be considered in lieu of a degree
- Extensive knowledge of a SOC’s/NOSC’s purpose and role within an organization
- Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc)
- Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc).
- Expertise with packet analysis tools such as Wireshark
group id: 10105424
Accelerating IT transformation in the public sector