Cybersecurity Analyst

TekSynapFort Belvoir, VA
4hOnsite

About The Position

We are seeking a Cyber Security Analyst to join our Prime Contract with the Defense Threat Reduction Agency. TekSynap is a fast growing high-tech company that understands both the pace of technology today and the need to have a comprehensive well planned information management environment. “Technology moving at the speed of thought” embodies these principles – the need to nimbly utilize the best that information technology offers to meet the business needs of our Federal Government customers. We offer our full-time employees a competitive benefits package to include health, dental, vision, 401K, life insurance, short-term and long-term disability plans, vacation time and holidays. Visit us at www.TekSynap.com. Apply now to explore jobs with us! As part of the application process, you agree that TekSynap Corporation may retain and use your name, e-mail, and contact information for purposes related to employment consideration

Requirements

  • BS 5-7 Years, MS 3-5, PhD 0-2
  • Experience with cyber security architecture principles that achieve cybersecurity framework goals
  • Minimum of a Top-Secret Clearance with SCI eligibility
  • DOD 8570 IAT II and CSSP Analyst Certifications (DoD 8140)
  • U.S Citizenship Required
  • Top Secret Clearance requirement

Responsibilities

  • Collect and analyze network and/or host artifacts from a variety of sources to include logs, system images and packet captures to characterize activity, determine root cause, operational impact, and to enable rapid remediation and/or mitigation of cyber threats within the Enterprise Network through the investigation process.
  • Perform cyber incident triage; to include determining scope, urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation.
  • Must have working knowledge of the CJCSM 6510.01B (Cyber Incident Handling Program)
  • Provide expert technical support and perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support subordinate organizations and system owners.
  • Manage and document cyber defense incidents from initial detection through final resolution methods.
  • Maintain an average of at least two new detection use cases per month during each year of contract execution. Detection use cases shall be based on current threats, the MITRE ATT&CK framework, or Government direction.
  • Maintain metadata for all detection use cases to include use case owner, number of false positives identified, number of true positives identified, and average time to execute (based on incident detection monitoring analyst feedback).
  • Analyze all completed incident records and make improvements to related detection use cases.
  • Collect and analyze network and/or host artifacts from a variety of sources to include logs, system images and packet captures to characterize activity, determine root cause, operational impact, and to enable rapid remediation and/or mitigation of cyber threats within the Enterprise Network through the investigation process.
  • Make recommendations to correlation rules, filters, signatures, or plays to enhance overall effectiveness by lowering false-positive rates. Track and validate refinement requests and provide metrics on these activities monthly.
  • Assist with develop methods for automating the execution of incident detection use cases that result in false-positive rates below 10%. Provide monthly reports on new automation actions and their results.
  • At the direction and under the supervision of Government personnel, validate the effectiveness of any plays created by emulating adversary tactics to trigger the necessary alerts (blue team).
  • Demonstrate effectiveness by creating detection use cases that successfully detect Red Team (penetration testing) activity.
  • Utilize the MITRE ATT&CK matrix and other threat frameworks to develop detection use cases. Continually refine these processes with the goal of automating their execution.
  • Provide subject matter expertise in creation, editing, and management of signatures, rules and filters for specialized network defense systems including but not limited to network and ESS IDS, IPS, firewall, web application firewall, proxy and SIEM systems.
  • Analyze SIEM views daily to ensure views support detection and response operations. Modify SIEM views to eliminate false-positive or unnecessary alerts.

Benefits

  • health
  • dental
  • vision
  • 401K
  • life insurance
  • short-term and long-term disability plans
  • vacation time
  • holidays
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service