Posted in

Cyber Security Analyst

Cyber Security Analyst

CompanyPeraton
LocationWashington, DC, USA
Salary$112000 – $179000
TypeFull-Time
DegreesBachelor’s
Experience LevelSenior

Requirements

  • BS with 5+ Years of relevant experience, MS with 3 Years, 4 additional relevant years of experience may be considered in lieu of a degree
  • Active TS/SCI clearance is required
  • Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience (additional relevant work experience can be substituted for a degree)
  • Must have a current DoD 8570.1-M IAT Level II certification

Responsibilities

  • Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity, host activity, and data. This includes, but is not limited to: network flow (i.e. netflow) or related forms of session summary data, signature-based IDS/IPS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types)
  • Triage IDS/IPS alerts, collect related data from various systems, review open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure
  • Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions
  • Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity
  • Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins
  • Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types
  • Develop IDS/IPS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance
  • Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis
  • Develop security metrics and trend analysis reports

Preferred Qualifications

  • Desired Certifications: CEH, GCIH, GCIA, GCFA
  • 1+ year in a SOC or Incident Response role
  • Experience with Cisco Firepower, Cisco Sourcefire, Cisco Advanced Malware Protection, Cisco Stealthwatch, Cisco Umbrella
  • Experience with deploying and writing signatures (Snort, YARA, HIPS)
  • Experience with network hunting utilizing Zeek/Bro
  • Experience with McAfee ePO, HBSS
  • Splunk: Create log searches, dashboards, setting up alerts, and scheduled reports to help detect and remediate security concerns
  • Experience with ArcSight
  • Experience with Wireshark and packet analysis
  • Experience with Tanium or other endpoint solutions
  • Working knowledge of scripting languages such as Python, PowerShell, Shell
  • Knowledge of Regular Expressions
  • Knowledge of server and client operating systems
  • Participate in development and reporting of security metrics
  • Experience in a SOC or Incident Response role