Job description
<p><strong><span style="color: rgb(0, 0, 0)">Title: </span><span style="color: rgb(192, 0, 0)">Network Based Systems Analyst - II - NBA02</span></strong><br><br><strong><span style="color: rgb(0, 0, 0)">Description:</span></strong> <br><span style="color: rgb(0, 0, 0)">Our client is supporting their prime contractor and their U.S. Government customer for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. They are providing advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. Personnel perform investigations to characterize the level of severity of breaches and develop mitigation/remediation plans. </span> <br><br><span style="color: rgb(0, 0, 0)">they are seeking an experienced and technically proficient </span><strong><span style="color: rgb(192, 0, 0)">Network Based Systems Analyst - II - NBA02 </span></strong><span style="color: rgb(0, 0, 0)">to support the design, development, and deployment of advanced cybersecurity capabilities.</span><br><strong><span style="color: rgb(0, 0, 0)">Eligibility:</span> </strong></p><ul><li><p><span style="color: rgb(0, 0, 0)">Must be a </span><strong><span style="color: rgb(0, 0, 0)">US Citizen</span></strong> </p></li><li><p><span style="color: rgb(0, 0, 0)">Must have an </span><strong><span style="color: rgb(0, 0, 0)">active </span><span style="color: rgb(192, 0, 0)">TS/SCI</span></strong> <span style="color: rgb(0, 0, 0)">clearance</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Must be able to obtain DHS Suitability </span><span style="color: rgb(192, 0, 0)"><u>prior to</u></span> <span style="color: rgb(0, 0, 0)">starting employment </span> </p></li><li><p><strong><span style="color: rgb(192, 0, 0)">2+ years </span></strong><span style="color: rgb(0, 0, 0)">of directly relevant experience in network investigations</span></p></li></ul><p><strong><span style="color: rgb(0, 0, 0)">Responsibilities Include:</span> </strong></p><ul><li><p><span style="color: rgb(0, 0, 0)">Assists the Government lead in coordinating teams in preliminary incident response investigations</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Assists the Government lead with interfacing with the customer while on site</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Determines appropriate courses of actions in response to identified and analyses anomalous network activity</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Collects network intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Collects network device integrity data and analyze for signs of tampering or compromise</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements</span></p></li></ul><p><strong><span style="color: rgb(0, 0, 0)">Required Skills:</span> </strong></p><ul><li><p><span style="color: rgb(0, 0, 0)">In depth knowledge of TCP/IP protocols</span></p></li><li><p><span style="color: rgb(0, 0, 0)">In depth knowledge of standard protocols – ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc</span></p></li><li><p><span style="color: rgb(0, 0, 0)">In depth knowledge and experience of Wifi networking</span></p></li><li><p><span style="color: rgb(0, 0, 0)">In depth knowledge and experience of network topologies - DMZ’s, WAN’s, etc.</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Substantial knowledge of Splunk (or other SIEM’s)</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Knowledge of Computer Network Defense policies, procedures, and regulations</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Ability to identify and analyze anomalies in network traffic using metadata</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Experience with reconstructing a malicious attack or activity based on network traffic</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Experience examining network topologies to understand data flows through the network</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Must be able to work collaboratively across physical locations</span></p></li></ul><p><strong><span style="color: rgb(0, 0, 0)">Desired Skills: </span> </strong></p><ul><li><p><span style="color: rgb(0, 0, 0)">Substantial knowledge of network device integrity concepts and methodologies</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with network analysis software (e.g. Wireshark)</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with carving and extracting information from PCAP data</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with non-traditional network traffic (e.g. Command and Control)</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with preserving evidence integrity according to standard operating procedures or national standards</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with designing cyber security systems and environments in a Linux and/or Windows environment</span></p></li><li><p><span style="color: rgb(0, 0, 0)">Proficiency with virtualized environments</span></p></li></ul><p><strong><span style="color: rgb(0, 0, 0)">Desired Certifications:</span></strong><span style="color: rgb(0, 0, 0)"> -DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst; DoD 8140.01 GCIA, GCIH, CSSP Analyst/CSSP Incident Responder; DoD 8140.01 CEH, CSSP Analyst; SANS GIAC GNFA preferred</span><br><br><strong><span style="color: rgb(0, 0, 0)">Required Education:</span></strong><span style="color: rgb(0, 0, 0)"> BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 4+ years of network investigations experience.</span></p>
Required Skill Profession
Computer Occupations