Cyber Security Analyst II

Pensacola, Florida

Salary Details: $80400.00 - 154100.00 a year

Navy Federal Credit Union
Navy Federal Credit Union
Apply for this Job
Overview

To provide 2rd Tier response to security incidents in a 24/7/365 Cyber Security Operations Center. Ensure adherence to standard operating procedures for detecting, classifying, and reporting incidents. Provide detection and troubleshooting support for cyber incidents escalated from Tier 1 analysts. Partner with Tier 3 staff to resolve cyber incidents. Works under minimal supervision.

Responsibilities

Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
Coordinate with enterprise-wide cyber defense staff to validate network alerts
Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
Perform cyber defense trend analysis and reporting
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
Determine tactics, techniques, and procedures (TTPs) for intrusion sets
Examine network topologies to understand data flows through the network
Recommend computing environment vulnerability corrections
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
Isolate and remove malware
Identify applications and operating systems of a network device based on network traffic
Reconstruct a malicious attack or activity based off network traffic
Identify network mapping and operating system (OS) fingerprinting activities
Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan
Analyze and report organizational security posture trends
Analyze and report system security posture trends
Assess adequate access controls based on principles of least privilege and need-to-know
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise
Assess and monitor cybersecurity related to system implementation and testing practices
Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities
Work with stakeholders to resolve computer security incidents and vulnerability compliance
Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system IDS logs) to identify possible threats to network security
Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems
Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support Incident Response Teams (IRTs)
Track and document cyber defense incidents from initial detection through final resolution
Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, and security robustness).
Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
Coordinate with intelligence analysts to correlate threat assessment data
Write and publish after action reviews
Coordinate incident response functions
Provide technical summary of findings in accordance with established reporting procedures
Coordinate resolution with Tier 2/3 and/or Supervisor for high priority incidents in a timely manner
Execute daily adhoc tasks or lead small projects
Perform other duties as assigned

Qualifications

Intermediate skill monitoring and analyzing logs and alerts from a variety of different technologies, including IDS/IPS, firewall, proxies, and anti-virus across multiple platforms
Intermediate skill to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats
Intermediate skill to leverage online research tools to identify and navigate online forums, specialized Web sites, social media, and traditional sources
Intermediate experience in coordinating and responding to events on all of the monitored networks and the systems on those networks
Intermediate experience in incident response in hybrid models
Intermediate experience in analyzing, correlating log events for cloud technologies during complex investigations and to develop detections
Experience in analyzing security systems, and how changes in conditions, operations, or the environment will affect these outcomes
Experience in applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
Intermediate knowledge of security architectures, devices, proxies, and firewalls
Intermediate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Excellent verbal and written communication skills for reporting complex technical situations to various audiences, including executive leadership and nontechnical staff.
Intermediate research, analytical, and problem solving skills
Intermediate skill presenting findings, conclusions, alternatives and information clearly and concisely
Intermediate skill working with all levels of management, supervisors, stakeholders and vendors
Effective skill in to collaborating with other teams on time sensitive incidents
Ability to document resolution path for incident response and remediation activities into standard operating procedures

Desired Qualifications

Bachelor degree in cybersecurity or related discipline
Basic experience with security tools related to enterprise log management, IDP/IDS, antivirus, firewalls, proxies, DLP, forensic analysis and SIEM
Experience with Security Tools related to Enterprise Log Management, IDP/IDS, Antivirus, Firewalls, Proxies, DLP, Forensic Analysis, Malware analysis and SIEM
Basic experience in Cybersecurity analysis, incident response, or a related field with increasing responsibility
Experience in a Security Operations Center (SOC) or Network Operations Center (NOC)
Sec+, Net+, CySA+ or other related Information Security certifications
AZ-900 or other related Cloud Security certifications
Working knowledge of IT Security Standards and Frameworks including ISO and NIST

Hours: Monday - Friday, 6:00AM - 10:30PM (Day or evening shift as needed)

Locations: 820 Follin Lane, Vienna, VA Heritage Oaks Dr. Pensacola, FL Security Dr. Winchester, VA 22602

About Us

Navy Federal provides much more than a job. We provide a meaningful career experience, including a culture that is energized, engaged and committed; and fierce appreciation for our teams, who are rewarded with highly competitive pay and generous benefits and perks.

Our approach to careers is simple yet powerful: Make our mission your passion.

• Best Companies for Latinos to Work for 2024

• Computerworld Best Places to Work in IT

• Forbes 2024 America's Best Large Employers

• Forbes 2024 America's Best Employers for New Grads

• Forbes 2024 America's Best Employers for Tech Workers

• Fortune Best Workplaces for Millennials 2024

• Fortune Best Workplaces for Women 2024

• Fortune 100 Best Companies to Work For 2024

• Military Times 2024 Best for Vets Employers

• Newsweek Most Loved Workplaces

• 2024 PEOPLE Companies That Care
. click apply for full job details
Date Posted: 10 April 2025
Apply for this Job