Senior Cyber Security Threat Intelligence Analystother related Employment listings - Washington, DC at Geebo

Senior Cyber Security Threat Intelligence Analyst

//W3C//DTD XHTML 1.
0 Strict//EN'' ''-strict.
dtd''> Bering Straits Native Corporation (BSNC) is a recognized leader in providing Technical and Program Management Services, Information Technology, and Support.
BSNC has enabled their Government and Commercial clients to achieve their organizational initiatives through the application of high quality, innovative, and cost effective professional services and solutions.
We provide a positive working environment, with opportunities for advancement in our growing Federal sector workforce.
We offer an excellent compensation package which includes a generous salary, insurance (medical, dental, etc.
), paid leave, 401k plan and more.
We are committed to the diversity we bring to the marketplace and believe customer satisfaction comes first.
Job Description:
Bering Straits Native Corporation/Bering Global Services (BGS) is currently seeking a Senior Cyber Security Threat Intelligence Analyst for a project in Washington, DC.
The ideal candidate for this job will serve as a Cyber Security Threat Intelligence Analyst within the federal client s Security Operations Center.
A highly-motivated individual with strong technical, communication, and organizational skills will succeed on this program.
A proactive vs.
reactive mindset and endless curiosity regarding things that are out of the ordinary is essential.
You will hit the ground running, analyzing existing and new attacks against our platform.
The goal of the Security Operations Center (SOC) team is to proactively monitor, identify, and remediate information technology security vulnerabilities and intrusions.
The team, as the initial point of contact and triage, needs to ensure that all operational security controls are appropriately applied and managed and that systems within the control of the SOC have appropriate security controls in place in accordance with the Federal Information Security Management Act (FISMA).
To accomplish this goal, the security team is responsible for a broad suite of security technologies that include vulnerability scanning, malware detection, log file analysis, enterprise-wide incident response and security information and event management (SIEM) tools.
The analyst will be responsible for continuous surveillance, analysis, mitigation, remediation and incident management using the client s current SOC suite of tools.
Responsibilities:
Intrusion detection Analyze PCAPs Perform cyber investigations and analysis Computer forensics Experience and proficiency with red team-blue team exercises Cyber incident ticketing and response Ability to proficiently utilize the client s wide variety of security tools including:
Akamai Web Application Firewall Bit9 Carbon Black Forcepoint Web, Email, and DLP SentinelOne Palo Alto RSA Security Analytics/NetWitness ForeScout CounterACT Remedy Documentation of all activities, per requirements of audits Reporting generating and creating metrics for upper management REQUIRED SKILLS:
Strong understanding of basic computer and networking technologies TCP/IP stack Windows operating systems Common networking protocols SSH, SMB, SMTP, FTP/SFTP, HTTP/HTTPS, DNS, etc.
Common enterprise technologies Active Directory, etc.
Strong understanding of IT security principles, technologies, best practices, and NIST guidance Logical Access Control PKI and other encryption methods Network-based and host-based IDS/IPS Excellent analytical and problem solving skills.
Ability to work cohesively with the team, as well as independently to identify errors, and pinpoint root causes.
Ability to investigate and evaluate network traffic, read and interpret logs and packets.
Handle user reported cases of potential phishing campaigns.
Research and analyze wide variety of commodity and APT based malware and techniques.
Search our existing infrastructure for signs of malware and malicious events not detected by our existing security controls.
Utilize industry standard network and host forensic tools in order to fully understand the scope of an incident (sandbox, etc.
).
Ability to analyze data from various sources over time and create a clear narrative of observed behavior in writing and verbally.
Ability to multitask with a high degree of accuracy.
Outstanding communication skills.
Strong mastery of professional level English.
Ability to communicate with senior management and federal client staff both technical and non-technical in a clear and concise manner using proper spelling, punctuation and grammar.
Desire to not only work and learn from co-workers, but to also act as mentor at times.
High level expertise in Word, Excel, PowerPoint and Outlook.
Must be willing to do any duties, as assigned.
One or more of the following:
Network
Security
CySA
GCIH CEH PenTest
GPEN OSCP DESIRED SKILLS:
Interest in security/hacking culture.
Ability to think like an attacker.
Penetration Testing.
A continued desire to obtain additional education and certifications.
Server Administration background Windows or Linux/Unix.
Coding/scripting skills Python, Powershell, Bash, Perl, Javascript.
CLEARANCE REQUIREMENTS:
Public Trust or the ability to obtain and maintain a Public Trust clearance.
(Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information.
Accordingly, US Citizenship is required.
) - provided by Diceby Jobble.
Estimated Salary: $20 to $28 per hour based on qualifications.

  • Type: Other
  • Company: Bering Straits Native Corporation

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.