Overview
On Site
Full Time
Skills
Training
Mentorship
Analytics
Data Science
Security Engineering
Risk Management
Information Systems
Articulate
Incident Management
Network Protocols
Cyber Security
Privacy
Authentication
Intrusion Detection
Firewall
Microsoft Windows
NetFlow
Snort
IDS
Software Security
SQL
Scripting
TCP/IP
Tcpdump
Wireshark
Event Management
Splunk
ArcSight
Kibana
LogRhythm
Network Analysis
Threat Analysis
DoD
Regulatory Compliance
Information Assurance
Customer Engagement
CWNA
Auditing
Wireless Networking
Wireless Security
WLAN
Cisco
Network
Cisco Certifications
Wireless Communication
Security Clearance
Job Details
RealmOne was built on the principle that people matter first and foremost. We believe in providing a strong work/life balance by investing in our employees and encouraging professional and personal growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch industry professionals.
Join us on this journey as we execute this mission-critical contract providing high-end analytics and data science services within the REALM of cybersecurity.
Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security.
Job Description:
The Cyber Data Analyst 2 shall possess the following capabilities:
Qualifications:
Certifications Required:
Position requires active Security Clearance with appropriate Polygraph
Join us on this journey as we execute this mission-critical contract providing high-end analytics and data science services within the REALM of cybersecurity.
Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Risk Management and Assessment, and Insider Threat Analysis, by improving, protecting, and defending our Nation's Security.
Job Description:
- Uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur in order to protect data, information systems, and infrastructure. Finds trends, patterns, or anomaly correlations utilizing security-relevant data. Recommends proactive security measures. Conducts analysis to isolate indicators of compromise. Notify designated managers, cyber incident responders, and cybersecurity service provider team member of suspected cyber incidents and articulate the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
The Cyber Data Analyst 2 shall possess the following capabilities:
- Use cyber defense tools to monitor, detect, analyze, categorize, and perform initial triage of anomalous activity.
- Generate cybersecurity cases (including event's history, status, and potential impact for further action) and route as appropriate.
- Leverage knowledge of commonly used network protocols and detection methods to defend against related abuses.
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
- Perform advanced manual analysis to hunt previously unidentified threats.
- Conduct PCAP analysis.
- Identify cyber-attack phases based on knowledge of common attack vectors and network layers, models and protocols.
- Apply techniques for detecting host- and network-based intrusions.
- Working knowledge of enterprise-level network intrusion detection/prevention systems and firewall capabilities.
- Understand the foundations of a hardened windows network and what native services and protocols are subject to abuse.
- Familiarity with fragmentation of network traffic and how to detect and evaluate fragmentation related attacks in raw packet captures.
- Conduct network - traffic, protocol and packet-level - and netflow analysis for anomalous values that may be security-relevant using appropriate tools.
- Understand snort filters and how they are crafted and tuned to feed IDS alerting.
- Understand system and application security threats and vulnerabilities to include buffer overflow, SQL injection, race conditions, covert channel, replay and return-oriented attacks, malicious code and malicious scripting.
- Analyze malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Familiar with indications of Command and Control (C2) channels and what strategies attackers use to bypass enterprise defenses from a compromised host.
Qualifications:
- Four (4) years of demonstrated experience as CDA in programs and contracts of similar scope, type, and complexity required. A technical bachelor's degree from an accredited college or university may be substituted for two (2) years of CDA experience on projects of similar scope, type, and complexity.
- One (1) year of demonstrated and practical experience in TCP/IP fundamentals.
- One (1) year of demonstrated experience with tcpdump or Wireshark.
- Two (2) years of demonstrated experience using security information and event management suites (such as Splunk, ArcSight, Kibana, LogRhythm).
- Two (2) years of demonstrated experience in network analysis and threat analysis software utilization.
Certifications Required:
- Requires DoD 8570 compliance with CSSP Analyst baseline certification.
- Requires Information Assurance Technical (IAT) Level I or Level II certification.
- Requires Computing Environment (CE) certification.
- Requires Wireless certification similar to Certified Wireless Network Administrator (CWNA) to Assessing and Auditing Wireless Networks (GAWN), Certified Wireless Security Professional (CWSP), Offensive Security Wireless Fidelity (OSWP), Cisco Certified Network Associate (CCNA-Wireless), Or Cisco Certified Network Professional (CCNP-Wireless).
Position requires active Security Clearance with appropriate Polygraph
Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.