Our client partner is seeking a Tier 3 Cyber Threat Analyst to join our team on a highly visible cybersecurity single-award IDIQ vehicle that provides security operations center (SOC) support, cyber analysis, application development, and a 24x7x365 support staff.
Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyberthreats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to securityevents and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication.
?Investigating computer and information security incidents to determine extent of compromise to information and automated information systems
? Provide computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments
? Researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and networksecurity and encryption.
? The Tier 3 Analyst will lead and mentor other SOC Support Staff and will communicate with executive leadership regarding matters of significant importance to the DHS SOC Support Services Program
The Analyst should have expertise in at least one of the following specialized areas: Email security - Digital media forensic - Monitoring and detection - Incident Response - Vulnerability assessment and pen test - Cyber intelligence analysis Supports detection, containment, and eradication of APT activities targeting customer networks. Process community reporting, conduct link analysis, and collaborate with other Government cyber fusion teams. Publish intelligence products to inform network defenders about APT activities, new detection methods, among other topics of interest.
Will work a rotating shift consisting of three 12 hour shifts with four days off the first week of the pay period and three 12-hour shifts, one 8-hour shift and 3 days off the second week of the pay period.
Location: Alexandria, VA.
Requires Bachelors Degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 12 to 15years of prior relevant experience or Masters with 10 to 13years of prior relevant experience. May possess a Doctorate in technical domain. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or cyberforensics.
Minimum of current Top-Secret clearance with ability to obtain TS/SCI Clearance. In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
Minimum of 7years of specialized experience in one or more of the following areas:
? Email security
?Digital media forensic
? Monitoring and detection
? Incident Response
? Vulnerability assessment and Pen Test
? Cyber intelligence analysis
Must have at least one of the following certifications:
SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI, LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570: IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH"
Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyberthreat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcementinvestigations.