user avatar
Posted today

Job Requirements

San Antonio, TX
Intel Agency (NSA, CIA, FBI, etc) Polygraph Unspecified
Career Level not specified
Salary not specified
Join Premium to unlock estimated salaries

Job Description

Overview

Abacus Technology is seeking a Cyber Security/Network Defense Analyst to provide technical support for the AFCENT Network Operations and Security Center (NOSC) at Lackland AFB as part of a 24/7/365 support environment. This is a full-time position.

Responsibilities

  • Support real-time monitoring of all assigned IPS/IPS deployed and supporting the AFCENT/USCENTCOM mission.
  • Monitor network traffic to provide event correlations of operational traffic from multiple locations to determine network security posture.
  • Utilize standard/provided network tools to evaluate traffic for incident response analysis.
  • Coordinate and execute CYBERCOM Information Assurance Vulnerability Alert (IAVA) notices as applicable on USCENTCOM networks/systems with the AFCENT NOSC.
  • Maintain IDS/IPS devices to ensure they are operating at optimal efficiency.
  • Develop methods to detect and prevent intrusive activities utilizing these new vulnerabilities and exploits.
  • Assist NOSC-Cybersecurity to develop countermeasures to isolate, contain and prevent intrusive actives and secure AFCENT/USCENTCOM networks.
  • Track and correlate unusual and suspicious network activity across USCENTCOM.
  • Assist in the compilation of Network Defense statistical and trend data, and operational event reporting, as requested by NOSC management.
  • Provide site-specific and service-level intrusion packet level analysis using selected tools and activities related to mission execution; and track trends of authorized and unauthorized activity.
  • Provide an overall site-analysis and profile for existing USCENTCOM networks and supported units to serve as a benchmark to identify unusual or suspicious activity; and research, document, and report suspicious activity.
  • Perform cyber incident handling and support activities, including but not limited to, reporting and notifying, documenting, and coordinating: (1) detection of events; (2) preliminary analysis and identification; (3) preliminary response action; (4) incident analysis; (5) response and recovery; and (6) post incident analysis IAW applicable policy and directives.
  • Perform network traffic analysis to evaluate intruder activities using host and network based monitoring systems; correlate information gathered to provide effective methods to USCENTCOM domains; determine the probability of exploitation of discovered network vulnerabilities; and ensure appropriate notifications and action are taken to reduce the risk to USCENTCOM networks.
  • Support USCENTCOM 24/7 Network Defense monitoring operations.
  • Open and conduct network intrusion investigations to validate the unauthorized activity and determine the type and extent of activity.
  • Conduct network and computer forensics on suspected and confirmed compromised USCENTCOM systems to determine the method of intrusion and corrective actions to be taken to prevent or detect similar future activities.
  • Provide technical support and expertise to assist law enforcement and counterintelligence activities, and continue to conduct base network defense while component investigative agencies collect network evidence.
  • Provide support to USCENTCOM network administrators on the installation and analysis of packet sniffers their network topology.

Qualifications

3+ years experience in network and systems security. Bachelor's degree in a related field. Additional years of experience may be substituted for degree requirements. Must be CEH certified. Must hold the ITIL v3 or v4 Foundations certification or be able to obtain the certification within 60 days of hire. Extensive knowledge of network firewalls, computer and server log analysis, computer network servers (DNS, proxy, e-mail, domain controller, file server, Active Directory) and analysis of their logs. Extensive knowledge of digital evidence collection, handling and security; experience with computer incident response and analysis and report dissemination. Extensive knowledge and experience with network packet capture and analysis software such as WireShark (Ethereal) and Snort. Experience with standard DoD network topology and DMZ boundary protection. Experience with system analysis software (i.e. EnCase/EnCase Enterprise or FTK), software coding and debugging, and the virtual machine (VM) environment. Experience with DoD/AF incident reporting processes. Knowledge of threat visualization applications. Extensive knowledge of digital evidence collection, handling and security. Experience with computer incident response and analysis, and report dissemination. Extensive knowledge of DoD and AF network operations regulations; knowledge and experience processing Information Assurance Vulnerability Alert (IAVA) notices. Able to maintain current knowledge on new vulnerabilities and exploits. Experience with DoD/AF incident reporting processes. Familiar with NSA Threat Operations Center (NTOC) Attack, Sensing & Warning (AS&W) alerts and processing. Knowledge and experience constructing, executing and troubleshooting SQL DB queries. Knowledge and experience with the DOD Centaur analysis system. Must maintain an Advanced Traffic Analyst certification via Stan/Eval processes for operational positions. Must have strong communication skills and be able to interact professionally within all levels of an organization. Must be able to provide support in a 24/7/365 environment including occasionally covering shifts outside of the assigned shift and/or providing after hours, weekend, or holiday support as needed on a rotational basis. Must be a US citizen and hold a current Top Secret clearance with SCI access (TS/SCI).

Applicants selected will be subject to a U.S. government security investigation and must meet eligibility requirements for access to classified information.

EOE/M/F/Vet/Disabled
group id: 10109595
N
Name HiddenRecruiter
job ad image
Find Abacus Technology Corporation on Social Media
Network Employers
user avatar
About Us
To succeed in today’s rapidly changing business and technology environment, you need an experienced and agile partner you can trust. Abacus Technology brings big-business expertise without big-business inefficiencies. As an independent company, we make decisions that exceed customer—not shareholder—expectations. Clients choose us first for our proven performance and value, and they return for reliable results. We are “just right”—the spirit of a small business with the resources, stability, and experience of something larger. In 1983, Microsoft Word and Lotus 1-2-3 debuted, the web didn’t exist, Sally Ride went to space, and Dennis Yee founded Abacus Technology. Then a one-person logistics consultancy, Abacus has grown into a communications and IT firm with hundreds of employees across the U.S. and abroad. For 40 years, we’ve delivered sustained growth and profitability through proven performance on contracts of all sizes.
job ad2 image

Abacus Technology Corporation Jobs