Cyber Cloud Technologies LLC

  • Cybersecurity Network Analyst Level 2

    Job Locations US-MD-Fort Meade
    Posted Date 3 months ago(8/15/2018 2:14 PM)
    ID
    2018-1217
    # of Openings
    1
    Category
    Information Technology
  • Overview

    Two (2) years of demonstrated experience in Cybersecurity techniques and Network Analysis; three (3) years of demonstrated experience in intrusion analysis and incident response; and three (3) years of demonstrated experience with TCP/IP fundamentals, Windows and Linux/UNIX operating systems, and supporting Office applications. Demonstrated real-world incident management / incident response experience.

    Responsibilities

    A Bachelor’s degree in Software Engineering, Computer Science, Engineering, or related field from an accredited college is required. Four (4) years of experience in intrusion analysis and incident response may be substituted for a Bachelor’s degree.
    a) Experience with computer network exploitation, construction, and diagnostics of computer networks, network analysis, network threats and risks, incident response, and database research.
    b) Other applicable skills, including technical and narrative reporting.
    c) Maintain awareness of applicable computer network exploitation policies, regulations, and compliance documents.
    d) Analyze network packet information, Windows and Linux/UNIX OS system data, executable file data, host data, and metadata to identify and characterize anomalies on USG networks.
    e) Provide reporting on activities and assist in the development and optimization of new and existing tools and techniques to enhance analytic capabilities.
    f) Perform research utilizing Agency resource tools and databases.
    g) Provide analytic support at both network and host level to augment the Government team charged with identifying and characterizing anomalies on USG networks.
    h) Provide domain expertise in networking hardware and communication technologies, and systems programming.
    i) Develop and analyze exploitation tactics, techniques and procedures for a wide range of operating systems.

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed