Overview To provide 2rd Tier response to security incidents in a 24/7/365 Cyber Security Operations Center. Ensure adherence to standard operating procedures for detecting, classifying, and reporting incidents. Provide detection and troubleshooting support for cyber incidents escalated from Tier 1 analysts. Partner with Tier 3 staff to resolve cyber incidents. Works under minimal supervision.
Responsibilities - Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Coordinate with enterprise-wide cyber defense staff to validate network alerts
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
- Perform cyber defense trend analysis and reporting
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
- Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
- Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
- Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
- Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
- Determine tactics, techniques, and procedures (TTPs) for intrusion sets
- Examine network topologies to understand data flows through the network
- Recommend computing environment vulnerability corrections
- Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
- Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
- Isolate and remove malware
- Identify applications and operating systems of a network device based on network traffic
- Reconstruct a malicious attack or activity based off network traffic
- Identify network mapping and operating system (OS) fingerprinting activities
- Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
- Notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan
- Analyze and report organizational security posture trends
- Analyze and report system security posture trends
- Assess adequate access controls based on principles of least privilege and need-to-know
- Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise
- Assess and monitor cybersecurity related to system implementation and testing practices
- Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities
- Work with stakeholders to resolve computer security incidents and vulnerability compliance
- Provide advice and input for Disaster Recovery, Contingency, and Continuity of Operations Plans
- Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents
- Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation
- Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system IDS logs) to identify possible threats to network security
- Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
- Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems
- Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support Incident Response Teams (IRTs)
- Track and document cyber defense incidents from initial detection through final resolution
- Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, and security robustness).
- Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
- Coordinate with intelligence analysts to correlate threat assessment data
- Write and publish after action reviews
- Coordinate incident response functions
- Provide technical summary of findings in accordance with established reporting procedures
- Coordinate resolution with Tier 2/3 and/or Supervisor for high priority incidents in a timely manner
- Execute daily adhoc tasks or lead small projects
- Perform other duties as assigned
Qualifications - Intermediate skill monitoring and analyzing logs and alerts from a variety of different technologies, including IDS/IPS, firewall, proxies, and anti-virus across multiple platforms
- Intermediate skill to develop specific expertise, discern patterns of complex threat actor behavior, and communicate an understanding of current and developing cyber threats
- Intermediate skill to leverage online research tools to identify and navigate online forums, specialized Web sites, social media, and traditional sources
- Intermediate experience in coordinating and responding to events on all of the monitored networks and the systems on those networks
- Intermediate experience in incident response in hybrid models
- Intermediate experience in analyzing, correlating log events for cloud technologies during complex investigations and to develop detections
- Experience in analyzing security systems, and how changes in conditions, operations, or the environment will affect these outcomes
- Experience in applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Intermediate knowledge of security architectures, devices, proxies, and firewalls
- Intermediate knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
- Excellent verbal and written communication skills for reporting complex technical situations to various audiences, including executive leadership and nontechnical staff.
- Intermediate research, analytical, and problem solving skills
- Intermediate skill presenting findings, conclusions, alternatives and information clearly and concisely
- Intermediate skill working with all levels of management, supervisors, stakeholders and vendors
- Effective skill in to collaborating with other teams on time sensitive incidents
- Ability to document resolution path for incident response and remediation activities into standard operating procedures
Desired Qualifications - Bachelor degree in cybersecurity or related discipline
- Basic experience with security tools related to enterprise log management, IDP/IDS, antivirus, firewalls, proxies, DLP, forensic analysis and SIEM
- Experience with Security Tools related to Enterprise Log Management, IDP/IDS, Antivirus, Firewalls, Proxies, DLP, Forensic Analysis, Malware analysis and SIEM
- Basic experience in Cybersecurity analysis, incident response, or a related field with increasing responsibility
- Experience in a Security Operations Center (SOC) or Network Operations Center (NOC)
- Sec+, Net+, CySA+ or other related Information Security certifications
- AZ-900 or other related Cloud Security certifications
- Working knowledge of IT Security Standards and Frameworks including ISO and NIST
Hours: Monday - Friday, 6:00AM - 10:30PM (Day or evening shift as needed)
Locations: 820 Follin Lane, Vienna, VA Heritage Oaks Dr. Pensacola, FL Security Dr. Winchester, VA 22602
About Us Navy Federal provides much more than a job. We provide a meaningful career experience, including a culture that is energized, engaged and committed; and fierce appreciation for our teams, who are rewarded with highly competitive pay and generous benefits and perks. Our approach to careers is simple yet powerful: Make our mission your passion . click apply for full job details