Job Duties and Responsibilities
Ready to join ManTech and help our Department of Veterans Affairs customer maintain a strong Cyber Security posture?
The Cyber Security Analyst will join our team in protecting the Department of Veterans Affairs computer systems and networks. The selected candidate must have experience collaborating with IT users and customers to document and strategize on improvements to current business processes (i.e., business process reengineering). This member of our team will be responsible for delivering market research on conditions impacting the operational efficiency of the organization and identifying root causes for process improvement.
The successful candidate must be well-versed in security operations, cyber security tools, and Open Source information gathering from public and private sources. The candidate will provide operational support on expert level analysis in regards to Advanced Persistent Threats (APTs), Indicators of Compromise (IOC), Intelligence Gathering and sharing this information with other formalized partners. Duties and responsibilities may include, but are not limited to:
Gather, extract, and disseminate open source intelligence (OSINT) on threat actors targeting the VA, health care industry, government agencies in general, as well as public sector.
Work with industry partners to gather and share intelligence. Apply intelligence to the VA network and systems to proactively identify potential cyber threats.
Provide proactive event monitoring/event management/configuration of the following security tools for targeted threats and malicious activity including but not limited to: Splunk, Palo Alto Networks, McAfee EPO, Cisco Ironport, Netscout, Sourcefire Defense Center and Bigfix
Determine if an event meets the criteria for additional cyber hunt investigation and/or constitutes a security incident subject to investigation
Review audit logs and identify any unusual or suspect behavior
Provide targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks
Develop and execute custom scripts to identify host-based indicators of compromise
Provide advanced technical capabilities to senior leadership, including Big Data Analytics, and Predictive Intelligence
Provide proactive APT hunting, incident response support, and advanced analytic capabilities
Profile and track APT actors that pose a threat to the organization in coordination with threat intelligence support teams
Support the incident response process by providing advanced analysis services when requested to include recommending containment and remediation processes, independent analysis of security events, and reporting of identified incidents to Incident Handling (IH)
Provide all VA cyber task areas with actionable intelligence and serve as the threat dissemination hub.
Experience in cyber investigations and information gathering techniques, required
Experience briefing C-level executives on current threat landscapes with future analytic predictions
In depth understanding of NIST SP 800-61, US CERT and Office of Management and Budget (OMB) standards
Experience interpreting and implementing cyber security regulations
Requires Bachelors degree or equivalent and five to seven years of related experience. Minimum of two years experience in technology/tools specific to the target platforms