Cybersecurity Analyst with Security Clearance

San Antonio, Texas

Apex Systems
Job Expired - Click here to search for similar jobs
Client Industry: Government/Professional Services and Information Technology Job Type: 6 month contract to hire Location: Remote to Start/After 3-6 weeks, required to sit fully onsite in San Antonio, TX Schedule: Night shift (6:00pm-6:00am CST)
Panama schedule: 2 days on, 2 days off, 3 days on, 2 days off, 2 days on, 3 days off. Works weekends and holidays. Interview Process: 1 round, 1 hour Clearance/Certifications Required: Active DoD Top Secret Clearance with SCI Eligibility In order to have your application submitted, receive a request to interview, and receive an offer, you must have the certification below.:
CEH (Certified Ethical Hacker) In order to receive a finalized start date, you must have at least one certification below. If you do not have at least one of the required certifications below, a contingent offer will be given to complete/receive one of the certifications within 30-45 days from your offer to remain on the program. Financial assistance available :
CompTIA Network+ OR CCNA In order to sit onsite after the initial 6 weeks of employment (remote), you must have/receive the certification below: Financial assistance available : ITIL 4 certification What You'll Get to Do
An exciting and immediate opportunity for a Cybersecurity Network Defense Analyst to support the USAF Network Operations Security Center (NOSC). This position works on site and is a shift work position in a work center providing 24x7x365 support at Lackland Air Force Base in San Antonio, Texas. If you want to use your advanced IT skills to support national security then this is the job for you. You'll get to use leading edge technology as you sustain and defend the networks our Air Force warfighters use in the CENTCOM theater. More About the Role
Assist other active duty, government civilians, and contractors assigned to the same functional areas. Provide technical reports, meeting minutes, program plans, concepts of operations, contingency plans, and related documentation as identified for task deliverables.
Prepare and disseminate operational reports. Support real-time monitoring of all assigned IPS/IPS deployed and supporting the mission.
Monitor network traffic to provide event correlations of operational traffic from multiple locations to determine network security posture.
Use standard/provided network tools to evaluate traffic for incident response analysis.
Coordinate and execute JTF-GNO Information Assurance Vulnerability Alert (IAVA) notices.
Maintain IDS/IPS devices.
Perform IDS/IPS Real-Time Monitoring Analysis.
Perform Network Event Correlation/Advanced Traffic Analysis.
Perform Incident Response & Analysis.
Perform Vulnerability Analysis.
Perform IDS/IPS Sensor installation, configuration, and maintenance. Provide IDS/IPS Database & VPN Technical Support.
Conduct Network Defense Training.
Support Standardization & Evaluation (Stan/Eval) activities.
Perform Operational Process Tracking and Processing.
Provide Systems and Exercise Planning support
Prepare Network Defense Technical Reports. Prepare and present oral and written technical communications. You will also be required to:
Provide oral and written briefs, presentations, and professional reports to Government senior leaders and decision makers.
Provide on-call support via cell phone after hours, on weekends and holidays. Qualifications: Active DoD Top Secret Security Clearance with SCI eligibility B.S. in related field, AND 5 or more years' relevant IT experience; OR 7 or more years' relevant IT experience.
Required certifications from the list above Possess the following skill sets: Extensive knowledge of network firewalls, computer, and server log analysis.
Extensive knowledge of digital evidence collection, handling, and security.
Experience with computer incident response and analysis and report dissemination.
Extensive knowledge and experience with network packet capture and analysis software such as WireShark (Ethereal) and Snort.
Experience with standard DoD network topology and DMZ boundary protection.
Experience with system analysis software (i.e. EnCase/EnCase Enterprise or FTK), software coding and debugging, and the virtual machine (VM) environment.
Experience with DoD/AF incident reporting processes.
Familiarity with NSA Threat Operations Center (NTOC) Attack, Sensing & Warning (AS&W) alerts and processing.
Knowledge and experience constructing, executing, and troubleshooting SQL DB queries.
Knowledge and experience with the DOD Centaur analysis system.
Possess experience with DoD/AF incident reporting processes; knowledge of threat visualization applications; extensive knowledge of digital evidence collection, handling, and security; experience with computer incident response and analysis, and report dissemination; extensive knowledge of DoD and AF network operations regulations; knowledge and experience processing Information Assurance Vulnerability Alert (IAVA) notices. These Qualifications Would Be Nice to Have
Experience working in DoD, Air Force, and local base environments
Date Posted: 16 May 2024
Job Expired - Click here to search for similar jobs