CGI-posted 4 days ago
Full-time • Mid Level
Hybrid • Huntsville, AL
5,001-10,000 employees

CGI Federal is looking for Cyber Security Analyst to support our Managed Security Services based out of Huntsville, AL. We provide Incident Management and Intrusion Detection services, along with Threat Hunting and in-depth analysis to our customers. Qualified applicants will be on the forefront of incident response where they will utilize the latest in network security technology to provide Computer Network Defense and Information Assurance (IA) support to CGI Federal and its customers. This position is located in our Huntsville, AL, Lafayette, LA, Knoxville, TN, Lebanon, VA, or Belton TX office; however, a hybrid working model is acceptable.

  • Understand and maintain the appropriate knowledge of tools, security procedures, and services within the CGI Federal Managed Security Services (MSS).
  • Ensure that event analysis and incident reports are documented and quality control is applied to ensure accuracy.
  • Assist in developing and maturing the future services and capabilities of the MSS, such as Threat Management, Penetration Assessments Activities, Tool & Automation Management, and more.
  • Identify improvements within processes, procedures, policies, staffing, training, and tools to improve efforts and daily operations.
  • Ensure that all procedures and operations are carried out as tasked.
  • Responsible for shift activity logging and daily operations in terms of making sure that daily shift responsibilities are completed.
  • Understand & contribute to the improvement and direction of CGI Federal's MSS objectives, direction, and procedures.
  • Maintain the ability to complete all MSS operations and procedures and ensure the proper escalation and leadership knowledge is provided.
  • Ensure the proper documentation of tickets, shift documentation, correspondence, and escalations.
  • Ensure events are handled at detection time according to established procedures.
  • Demonstrate excellent communication and client care skills by documenting all activities within our client delivery systems and communicating with client representatives in a timely manner.
  • Stay informed of current events in the security industry including the latest exploits and threats as well as preventative measures, remediation, and restoration techniques.
  • Act as the escalation point for client requests for information and presence.
  • Mentor team members to improve quality and consistency of security information analysis of network traffic.
  • Assist analysts in investigation and ticket creation efforts.
  • Provide daily monitoring and alerting of events that occur within the near real time environment.
  • Due to the nature of this government contract, US Citizenship is required
  • BA or BS degree from a recognized university with specialization in Computer Sciences or a related discipline
  • A minimum of three to five (3 - 5) years of directly related practical experience and demonstrated ability to carry out the functions of the job.
  • Hands on experience conducting incident response
  • Experience working in an IT Security Operations Center using SANS methodology
  • Experience and extensive knowledge of Security Information Event Management (experience with Google SecOps/Chronicle preferred)
  • Experience in Intrusion Detection or Prevention Systems
  • Knowledge of: TCP/IP, computer networking, routing and switching
  • Experience in Linux/UNIX and Windows based devices at the System Administrator level
  • System log forensics (Syslog, Event Viewer)
  • Strong troubleshooting, reasoning and problem-solving skills
  • Team player, excellent communication skills, good time management
  • Organizational skills and the ability to work autonomously with attention to processes
  • Ability to speak and communicate effectively with peers, management and clients
  • Ability and experience in writing clear and concise technical documentation
  • Ability to speak and write fluently in English
  • Dual citizenship is not applicable for this role
  • SIEM/SOAR experience (Splunk, Microsoft Sentinel, Google SecOps/Chronicle, Cortex XSOAR, Crowdstrike)
  • Experience using ticketing systems such as Remedy, LANDesk, ServiceNow
  • Experience creating, reviewing, & tuning automations in SOAR solutions
  • Security +, Network +, CISSP, CEH, GCIA, GCIH, CISM, SPLUNK Training highly valued
  • Knowledge of: Strong Authentication, End Point Security, Internet Policy Enforcement, Firewalls, Web Content Filtering, Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions
  • Competitive compensation
  • Comprehensive insurance options
  • Matching contributions through the 401(k) plan and the share purchase plan
  • Paid time off for vacation, holidays, and sick time
  • Paid parental leave
  • Learning opportunities and tuition assistance
  • Wellness and Well-being programs
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service