Senior Cybersecurity (CND) Analyst , Springfield, VA – Must have active TS/SCI Clearance and willing to take/pass a Polygraph

Full Time
Springfield, VA
Posted
Job description

Clearance Requirements: Active TS/SCI clearance and willing to take/pass a Polygraph.

Position # 232

Benefits include 15 days PTO, 11 days Paid Government Holidays, a 401k with 6% matching and an inclusion in our employee profit sharing program.

Description

The Senior CND Analyst responsible for identifying, analyzing, and mitigating threats to hosted information systems. Uses Computer Network Defense tools, defensive measures, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the enterprise network to protect information, Information Systems, and networks from threats.

Responsible for investigating and analyzing response activities related to cyber incidents within the environment. Responsible for correlating incident data and performing CND trend analysis and reporting. Develops and provides CND activity/incident reports, summaries, and other situational awareness information, and presents to the CIO or designated representative(s). Develops and maintains documentation as it pertains to the use and operation of CND tools (SOPs, playbooks, incident reporting, incident response, etc.).

The Senior CND Analyst will prioritize, direct, guide, and evaluate other CND Analysts through training, quality control, and feedback in coordination with the CND Manager. The Senior CND Analyst shall develop and execute a continuous monitoring and analysis strategy for host information systems to monitor and report on any indications of outsider and insider threats; watch for and report on unauthorized changes; and monitor the operational environment and report on any suspected intrusions. Shall utilize Splunk software to include Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA) for continuous monitoring, incident reviews, investigations, and event correlation.

Mandatory Qualifications

  • Shall have 7 or more years of experience in Information Security (INFOSEC) operations and/or cybersecurity-related experience.
  • Shall have 5 or more years of experience in operating a SIEM and/or vulnerability scanner product (Splunk, Tenable, etc.).
  • Bachelor’s Degree from an Accredited University, or
  • Certified Computer Security Incident Handler (CSIH)
  • GIAC Certified Incident Handler (GCIH)

Desired Qualifications

  • 7 or more years of experience working in an operational Security Operations Center (SOC) as a cybersecurity professional, or amongst a team with responsibility for similar functionality and behavior.
  • 7 or more years of hands-on experience working with industry standard solutions for some, or all, of the following: Security Information and Events Management (SIEM), Vulnerability Assessment and Management, Advanced Network Inspection/Analysis, Advanced Malware Detection, Data Loss Prevention (DLP), Incident Response, Forensics Tools, User Activity Monitoring (UAM), and User Behavioral Analytics (UBA) solutions.

seankuhnke.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, seankuhnke.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, seankuhnke.com is the ideal place to find your next job.

Intrested in this job?

Related Jobs

All Related Listed jobs