Job Description
Department Marketing Statement: Are you passionate about protecting digital landscapes and eager to kickstart your career in cybersecurity? We are looking for a dedicated and proactive individual to join our team as a Cybersecurity Analyst I. In this role, you will be at the forefront of our security operations, monitoring systems for potential threats and responding swiftly to incidents. You will gain hands-on experience and mentorship from senior analysts, enhancing your skills and advancing your career in cybersecurity. This is your chance to play a crucial role in safeguarding our organization's data and infrastructure, ensuring compliance with industry regulations and standards.
As a Cybersecurity Analyst I, you will collaborate with a dynamic team to implement cutting-edge security measures and contribute to our proactive defense strategies. You will be part of a fast-paced, challenging environment where your efforts will make a significant impact. Additionally, you will play a vital role in securing the public transportation systems in the nation's capital, ensuring the safety and resilience of critical infrastructure against cyber threats. If you are ready to make a difference and grow in the field of cybersecurity, apply now to become a Cybersecurity Analyst I. Your journey to becoming a cybersecurity expert starts here.
Minimum Qualifications Education - A Bachelor s degree from an accredited college or university
Experience - With a technical degree, no prior experience as a cybersecurity engineernalyst (Information System Security Officer ISSO or Information System Security Engineer ISSE is required)
- Or without a technical degree, six (6) months to one (1) year of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted is required
PreferredEducation - A Bachelor s degree in Computer Science, Cybersecurity or related field
Medical Group Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations.
Job Summary The Cybersecurity Analyst I is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitor information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats.
Essential Functions - Supports data analytics strategies based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated.
- Employs the best practices of cyber threat indicators, attacks and compromise monitoring to maintain awareness of the status of the highly dynamic operating environment. Coordinates and performs the collection, processing, analysis, and dissemination of cyber threat/warning assessments.
- Collects intelligence of data from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) and analyzes events that occur within the Washington Metropolitan Area Transit Authority (WMATA)'s environments (on-premises and cloud) for the purposes of mitigating threats.
- Contributes to the development of assessment plans and measures of performance and effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that WMATA has a properly managed cyber analysis framework.
- Assimilates data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats.
- Analyzes defensive and simulated offensive results, techniques used and information collected from a variety of sources to identify, and reports events that occur or might occur within the network to protect information, information systems, and networks from threats.
- Responds to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs).
- Provides incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminates threats.
- Provides consultation support for the program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel s Office) and external (e.g., law enforcement agencies, vendors, public relations professionals). Ensure the organization can respond to attacks quickly and eliminate threats.
- Applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering.
- Supports the activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices.
- Supports detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace.
- Supports the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations being the liaison between the security engineering and the authorizing official if required. Ensures that the analysis of the information from various sources within the enterprise is executed and recognizes a possible security violation or threat.
- Performs analysis to identify, collect, examine, and preserve evidence using controlled and documented analytical and investigative techniques. Analyzes digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures that forensically sound collection of images and inspection is done to discern possible mitigation/remediation on enterprise systems.
The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision.
Evaluation Criteria Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience.
Evaluation criteria may include one or more of the following:
- Skills and/or behavioral assessment
- Personal interview
- Verification of education and experience (including certifications and licenses)
- Criminal Background Check (a criminal conviction is not an automatic bar to employment)
- Medical examination including a drug and alcohol screening (for safety sensitive positions)
- Review of a current motor vehicle report
Closing WMATA is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, status as a protected veteran . click apply for full job details