New
Cyber Defense Analyst
![]() | |
![]() United States, D.C., Washington | |
![]() | |
Cyber Defense Analyst Washington DC / Hybrid Pay from $108,000/yr MUST : Experiences Cyber Analyst Active DoD Secret Clearance is required 5+ years of experience working as a Cyber Analyst with experience in malware analysis, digital forensics, data/network analysis, pen testing, incidence response handling, hardening and/or information assurance Extensive understanding of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks) Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored) Strong understanding of system administration, network, and operating system hardening technique Familiarity with common networking and routing protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications Knowledge of incident categories, incident responses, and timelines for responses Experience running damage assessments is a plus Excellent communication skills both written and verbal Ability to work well with senior leadership Strong attention to details and solid documentation skills Active CEH, CSIH, GCIH, GISF, GIAC or CISSP Bachelor's Degree is required DUTIES : Ideal candidate will be a part of the Federal Client's SOC team and will coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation Perform cyber defense trend analysis and reporting Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts Track and document cyber defense incidents from initial detection through final resolution Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness) Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise Coordinate with intelligence analysts to correlate threat assessment data Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat condition and determine which security issues may have an impact on the enterprise Coordinate incident response functions Quadrant is an affirmative action/equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, status as a protected veteran, or status as an individual with a disability. "Healthcare benefits are offered to all eligible employees according to compliance mandated by the Affordable Care Act". |