Cyber Security Analyst I

Akima, LLCAlbuquerque, NM
5dOnsite

About The Position

Provide Computer Security Monitoring and Incident Response to the Bureau of Indian Affairs as part of a multi-person Computer Incident Response Team (CIRT). Plans and implements security measures to protect computer systems, networks, and data from loss and service interruptions. Analyzes and documents security risks, breaches, and other cyber security incidents and the damage they cause. Oversees the monitoring of the computer networks for security issues. Installs and operates security software and measures to protect systems and information infrastructure, including firewalls and data encryption programs. May train staff on network and IT security procedures. Performs work under direct supervision. Handles basic issues and problems and refers more complex issues to higher-level staff.

Requirements

  • High School diploma or equivalent.
  • Must have excellent communication skills (oral and written).
  • Active/Current Security industry related certification (CCNA, GSEC, CEH, CCD, Cisco COP, OSCP etc.).
  • Minimum of 4+ Years of general IT Experience.
  • 1+ year of experience using Cyber Security tools such as (but not limited to) Security Onion, Splunk, Snort, Wireshark, etc.
  • Ability to work effectively independently as well as within a team environment.
  • The ability to obtain and maintain a client specific Public Trust clearance.
  • Linux experience.

Responsibilities

  • Monitoring the integrity and security of enterprise-wide cyber systems and networks as part of an incident response team.
  • Supports cyber security initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
  • Performs network traffic analysis utilizing raw packet data, IDS, IPS, and custom sensor output as it pertains to the cyber security of communications networks.
  • Reviews threat data from various sources and assist Engineers with development of custom signatures for Open-Source IDS or other custom detection capabilities.
  • Correlates actionable security events from various sources including Security Information Event Management System (SIEM) data.
  • Utilizes an understanding of attack signatures, tactics, techniques and procedures associated with advanced threats.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service