Information Assurance Specialist Network Security Analystother related Employment listings at Geebo

Information Assurance Specialist Network Security Analyst

Company Name:
Arca24.com
Salary period: Annual
Additional classifications: Engineering
TASC is seeking experienced professionals to join the Intelligence Solutions and Analytics (ISA) Sector. ISA provides specialized systems engineering, acquisition, and intelligence support to multiple Intelligence Community customers. The Information Assurance Specialists will provide security support services to the Agency's Cyber Security Operation Cell (CSOC) functional operations to perform 24x7x365 event monitoring, event investigating, and support the activities and equipment needed to safeguard computer infrastructure. Team will also provide the necessary Operations and Sustainment (O&S;) of the specialized equipment needed to perform the functions and manage the programs, described below: Conduct analysis for detecting and evaluating cyber events and/or intrusions.
Conduct briefings to senior leadership, as required by the government.
Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline.
Perform daily IDS and IPS analysis/monitoring and generating technical and executive summary reports.
Conduct incident response IAW DoD/IC policy (Chairman of the Joint Chiefs Staff Manual/CJCSM 6510, Intelligence Community Standard/ICS 502 and industry best practices such as NIST Special Publication 800-61).
Apply knowledge of information security services/analysis concepts, practices and procedures.
Research, design, develop, deploy, configure, administer, and maintain enterprise-wide Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security Information/Event Management (SIEM) infrastructure.
Conduct analyses of existing solutions to incorporate requested enhancements.
Review/analyze requested changes for equipment, technology and/or other factors/trends, which may impact existing solution.
Research current cyber events and/or intrusions for impact to Agency systems.
Implement government IDS and IPS design/deployment with government approval.
Develop/write custom IDS and IPS signatures and update proprietary signatures with government approval.
Develop SOP and other technical documentation for the IDS infrastructure IAW with current government policy.
Consult with hardware, communications, database experts and /or vendors to ensure system viability.
Perform system design functions, including interpretive analyses, chart preparation and associated diagrams/enhancement plans for network security.
Prepare/conduct acceptance test plans and confirm accompanying results, including the development of vulnerability assessments and functionality. To be approved by the government.
Conduct briefings to senior leadership, as required by the government.
Follow intrusion and escalation processes and procedures IAW with current government policy.
Required
Qualifications:
TS/SCI Clearance
Any Master's degree. Master's degree in Computer Information Systems, Computer Science, Information Technology, Information Science, Information Systems, or a related academic disciplines of science, technology, engineering, or mathematics preferred
10-15 years experience with minimum 6 years experience in Incident Monitoring
DoD 8570 Management Level III. CISSP and/or CISM preferred
SourceFire Certified Professional (SFCP) or GIAC Certified Intrusion Analyst Certification (GCIA)
Intrusion Analyst Experience
Network Packet Traffic Analysis Experience
Intrusion Signature creation and writing
ISC2 recognized professional certifications
Demonstrated Experience in Cyber Intelligence briefing preparation and presentation
Demonstrated Experience in Cyber Intelligence ResearchEstimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.