• Network Defense & Incident Response Analyst IRES - HSV Jobs in United States Of America

  • Jacobs Engineering Group Inc.
  • United States Of America, Usa
  • Save Job
  • 8 - 11 Years
  • Posted : above 1 month

Job Description:

Network Defense & Incident Response Analyst IRES - HSV - ( AER0002QP )


Description of Duties The Network Defense & Incident Response Analysts provide Defensive Cyber Operations (DCO) 24 hours a day 7 days a week, and provides real-time monitoring and analysis of insider and external threats utilizing network security tools Additionally, analysts provide incident response and recovery activities to the enterprise This position requires a Junior Network Defense & Incident Response Analyst to conduct intrusion detection and incident response on enterprise networks and maintain situational awareness of enterprise-wide cyber security

Candidate will

Utilize SIEM Tools to analyze and correlate event logs from network security devices and mission critical servers (eg, network and host-based security systems, firewalls, routers, switches, Servers, Workstations, etc) for indicators of compromise and known attack patterns Analyze and interpretation of log data within SIEM tools (eg, ArcSight, Splunk, etc)

Develop and disseminate computer network defense (CND) alert and notification messages to warn customers of threats and provide guidance for countermeasures to defend against identified threats

Review data originating from or reflecting status of ongoing intrusions or cyber security incidents and document the findings according to established procedures

Analyze vulnerabilities against known exploits that do not have vendor-provided mitigation or remediation action in enterprise cyber-threat environment and disseminate guidance to improve network defensive posture

Conduct the response and recovery actions for network and cybersecurity incidents utilizing Incident Response plans, to include reporting all pertinent details utilizing internal and external data management systems

Conduct digital forensic analysis and collect potential evidence by analyzing content of compromised systems Document relevant findings, and/or identify the tactics, techniques, and procedures used by an attacker and preserve forensic chain of custody for evidence when required

Draft Defensive Cyber Operations (DCO) alert and notification messages to warn customers of threats and provide countermeasure recommendations to defend against identified threats

Support the development, establishment, review and update of CND procedures, processes, manuals, and other documentation

This position can be filled at Schriever Air Force Base, CO or Redstone Arsenal in Huntsville, AL

This position will be posted for two weeks ending on 23 August 2019 If a candidate has not been selected at that time, it will continue to be posted until a suitable candidate is selected or the position is closed



Basic Requirements Must have one of the following combinations of education and experience HS Diploma (or GED) and 8 years of general experience; Associates degree and 6 years of general experience; Bachelors degree and 4 years of general experience; Masters degree and 2 years of general experience

Must have 6 years experience in the information security field and practical experience in an incident response role

Must have a current DoD 857001-M IAT Level II certification with Continuing Education (CE) - (CCNA Security, CySA , GICSP, GSEC, Security CE, SSCP)

Must have a current DoD 857001-M CSSP Incident Responder certification (CEH, CFR, CCNA Cyber Ops, CySA , GCFA, GCIH, SCYBER, or CHFI)

Candidate must have an active DoD Secret security clearance upon hire

Be able to obtain a DoD Top Secret clearance

Experience with security analysis and solutions in a WAN/LAN environment to include Routers, Switches, Network Devices, and Operating Systems (eg, Windows, and Linux)

Must be willing to work rotating shifts in a 24x7x365 operational environment and respond quickly to emergencies as needed

Must have excellent technical writing skills to accomplish required forensic and incident reporting

Experience with most MS Office applications (Word, Excel, PowerPoint, and Visio)

Must be willing to travel 25 PERCENT

Must be willing to provide training to other analysts

Desired Requirements

Bachelors degree in Information Technology, Cybersecurity, or related discipline

Experience with DoD DCO/Cyber Security Service Provider (CSSP), network, and system security policies and procedures

Experience with correlating security events across the enterprise using SIEM tools, ArcSight preferred

Experience with other Security Operations Centers (SOC)/DCO tools/applications, such as Firewalls, Intrusion Detection Systems / Intrusion Prevention Systems, Network Security Manager, Bluecoat, Barracuda, etc

Current DoD Top Secret clearance

GCIH, or GCFA certified preferred

Jacobs is an Equal Opportunity/Affirmative Action Employer All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status or other characteristics protected by law Jacobs is a drug-free workplace

Profile Summary:

Employment Type : Full Time
Eligibility : Any Graduate
Industry : Engineering/Projects, Consulting Services
Functional Area : IT Software : Software Products & Services
Role : System Security
Salary : As per Industry Standards
Deadline : 09th Feb 2020

Key Skills:

Company Profile:

Jacobs Engineering Group Incarfix

Salary trends based on over 1 crore profiles

View Salaries

All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd DMCA.com Protection Status