NetCentrics Corporation-posted 6 months ago
Mid Level
Washington, DC
251-500 employees

NetCentrics is seeking a highly motivated and technically skilled Mid-Level Cyber Defense Analyst to join our cybersecurity operations team. This role is responsible for supporting enterprise-wide cyber incident response and defense initiatives. The ideal candidate will have a strong background in threat analysis, intrusion detection, and real-time incident handling, and will be capable of correlating data from multiple sources to identify vulnerabilities and recommend effective remediation strategies.

  • Coordinate and execute incident response functions across enterprise systems.
  • Provide expert technical support to cyber defense technicians to analyze, resolve, and document incidents.
  • Perform log analysis from a wide range of sources including host, firewall, IDS, and network traffic logs to detect potential threats.
  • Conduct cyber incident triage, determine scope and urgency, identify vulnerabilities, and recommend immediate remediation.
  • Execute real-time incident handling activities such as forensic collection, intrusion correlation and tracking, and threat analysis.
  • Support deployable Incident Response Teams (IRTs) with technical tasks during active investigations.
  • Perform initial forensic image collection and inspection to support mitigation and remediation efforts.
  • Conduct cyber defense trend analysis and reporting to identify recurring patterns and emerging threats.
  • Receive, review, and analyze network alerts from internal monitoring tools and threat intelligence sources.
  • Track and document incidents from initial detection through final resolution, ensuring completeness and accuracy of case records.
  • Apply defense-in-depth principles and best practices, including layered security and redundancy.
  • Collect and analyze intrusion artifacts (e.g., malware, trojans, source code) to enhance incident mitigation strategies.
  • Collaborate with intelligence analysts to correlate cyber threat data and improve situational awareness.
  • Monitor external threat intelligence feeds (e.g., vendor advisories, CERT alerts, vulnerability databases) to stay informed of current threats and assess enterprise impact.
  • Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or related field (or equivalent work experience).
  • 3–5 years of experience in cybersecurity operations, with a focus on incident detection, response, or analysis.
  • Experience with log analysis tools (e.g., Splunk, ELK, QRadar), SIEM platforms, and forensic tools.
  • Familiarity with IDS/IPS, firewall technologies, and network protocols.
  • Solid understanding of cybersecurity frameworks (e.g., NIST 800-61, MITRE ATT&CK).
  • Strong analytical and troubleshooting skills.
  • Excellent verbal and written communication skills.
  • Experience supporting federal government cybersecurity programs.
  • Familiarity with threat hunting, endpoint detection and response (EDR) tools, and malware analysis.
  • Experience documenting and reporting to internal leadership or external regulatory bodies.
  • Relevant industry certifications such as: GIAC Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), CompTIA Cybersecurity Analyst (CySA+)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service