DecisionPoint-posted 1 day ago
Full-time • Mid Level
Onsite • San Antonio (JBSA), TX
101-250 employees

Overview DecisionPoint is seeking experienced CPT Operators to join our team to serve on Cyber Protection Team (CPT) in either a Cyber Security Network Analyst position or Cyber Security Host Analyst position in support of the Defensive Cyber Realization, Integration, and Operational Support (DCRIOS) II contract. This position is onsite at Joint Base San Antonio (JBSA). Duties & Responsibilities Conduct cyber threat hunting, network navigation, tactical forensic analysis, collection of valuable operational data, and when directed, execute operations in support of defensive initiatives. Provide support for persistent monitoring of all designated networks, enclaves, and systems. Candidates may be required to interpret, analyze, and report findings in accordance with computer network directives, including initiating, responding, and reporting discovered events. Candidates may be required to manage and execute first-level responses and address reported or detected incidents.

  • Conduct cyber threat hunting, network navigation, tactical forensic analysis, collection of valuable operational data, and when directed, execute operations in support of defensive initiatives.
  • Provide support for persistent monitoring of all designated networks, enclaves, and systems.
  • Candidates may be required to interpret, analyze, and report findings in accordance with computer network directives, including initiating, responding, and reporting discovered events.
  • Candidates may be required to manage and execute first-level responses and address reported or detected incidents.
  • Active TS/SCI clearance required.
  • Must be able to successfully pass/ maintain a U.S. Government Counterintelligence Polygraph (CI/Poly) post-hire
  • Have a Bachelor’s Degree or possess , or be willing to obtain, one of the following certifications: GCFA , GCIA, PenTest +, GCED , CFR, or Cloud+
  • Two (2) or more years’ experience in cyber security
  • DoD 8570.01-M IAT Level III certification (current )
  • Experience with toolsets such as Wireshark, the Elastic Stack , Arkime , Zeek, Metasploit, tcpdump , NMap , Nessus, Snort, EnCase, Forensic Toolkit, Windows Fundamentals, UNIX fundamentals, exploitation theory, privilege escalation, evidence removal
  • Have strong UNIX/Linux fundamentals along with familiarity of UNIX/Linux/Windows Command Line Interface (CLI) , Bash and PowerShell
  • Proficient in writing, editing, executing scripts on Windows, Linux, UNIX systems
  • Experience with encrypted and unencrypted remote access technologies, such as RDP, SSH, VPN, Telnet, and FTP
  • General knowledge of cyber security frameworks, such as the Cyber Kill Chain, MITRE ATT&CK , and the NIST 800 series
  • General knowledge of physical computer components and architectures, including the functions of computer domains, directory services, various components and peripherals, basic programming concepts, assembly codes, TCP/IP, OSI models, underlying networking protocols (e.g., DNS, ARP, etc.), security hardware and software
  • Candidate must be self-motivated and able to perform with minimal supervision
  • Knowledge of cyber forensic collection, preservation, and chain of custody
  • Experience with Endpoint Detection and Response (EDR) toolsets, such as Elastic Endpoint Security, Crowd S trike Falcon, and Trellix EDR
  • Experience with encryption, decryption, and hashing technologies such as DES, AES, RSA, PKI, SHA, and MD5
  • Knowledge of Red Team Tactics, Techniques, and Procedures (TTP)
  • Knowledge of distributed systems, process control, advanced routing, wireless, cloud, telecom and datacom platforms
  • Experience programming in C, C++, C#, Ruby, Perl, Python, SQL
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service