Overview
On Site
USD 71,500.00 - 81,500.00 per year
Full Time
Skills
Trend Analysis
Reporting
Security Architecture
Risk Management
Meta-data Management
Research
IDS
Packet Analysis
Access Control
ACL
System Administration
Operating Systems
Hardening
Information Security
Network Layer
Distribution
Communication
LAN
WAN
WLAN
WWAN
DLL
Malware Analysis
Dependability
Incident Management
Network
Intrusion Detection
Snort
Security Controls
NIST SP 800 Series
Cyber Security
Privacy
Authentication
SAP BASIS
Law
FOCUS
Job Details
Job Description
ECS is seeking a Cyber Defense Analyst -Junior to work in our Suitland, MD office.
General Description of Benefits
Required Skills
Desired Skills
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
ECS is seeking a Cyber Defense Analyst -Junior to work in our Suitland, MD office.
- Develop content for cyber defense tools.
- Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
- Coordinate with enterprise-wide cyber defense staff to validate network alerts.
- Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level.
- Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
- Perform cyber defense trend analysis and reporting.
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy.
- Identify and analyze anomalies in network traffic using metadata.
- Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
- Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
General Description of Benefits
Required Skills
- Strong written and verbal communication skills.
- Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute).
- Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists).
- Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins).
- Knowledge of incident response and handling methodologies.
- Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
- Experience with system administration, network, and operating system hardening techniques.
- Knowledge of cyber defense and information security policies, procedures, and regulations.
- Knowledge of the common attack vectors on the network layer.
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
- In-depth understanding of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
- Knowledge of various types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN).
- Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip).
- Knowledge of front-end collection systems, including traffic collection, filtering, and selection.
- Bachelor's degree.
Desired Skills
- Experience in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort).
- Ability to analyze malware and conduct vulnerability scans and recognize vulnerabilities in security systems.
- Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes.
- Experience evaluating the adequacy of security designs.
- Skill in using incident handling methodologies.
- Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
- Experience with using protocol analyzers and collecting data from a variety of cyber defense resources.
- Experience reading and interpreting signatures (e.g., snort).
- Experience with assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.)
- Ability to accurately and completely source all data used in intelligence, assessment and/or planning products.
- Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
ECS is an equal opportunity employer and does not discriminate or allow discrimination on the basis any characteristic protected by law. All qualified applicants will receive consideration for employment without regard to disability, status as a protected veteran or any other status protected by applicable federal, state, or local jurisdiction law.
ECS is a leading mid-sized provider of technology services to the United States Federal Government. We are focused on people, values and purpose. Every day, our 3800+ employees focus on providing their technical talent to support the Federal Agencies and Departments of the US Government to serve, protect and defend the American People.
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.