Jobs
>
Pensacola

    Job 58 Info System Security Analyst Principal I - Pensacola, United States - CYBER CODE MASTERS LLC

    Show more Collapse job
    Default job background
    Description

    Job Description

    Job DescriptionBenefits:
    • 401(k) matching
    • Health insurance

    Urgently looking for an experienced and technically proficient Senior Cybersecurity Detection Analyst who can support our customer in the detection, response, mitigation, investigation, and reporting of cyber threats affecting the client networks. This large mission critical development and sustainment program designs, builds, delivers, and operates a network operations environment introducing new cyber capabilities to address emerging threats.

    This position requires shift work including nights/weekends.
    Given 2 week notice this shift can change to another shift. This occurs throughout the year.

    Responsibilities include:
    Provide support in the real-time detection, response, mitigation, and reporting of cyber threats affecting client networks utilizing an enterprise SEIM.
    Maintain an understanding of the current vulnerabilities, response, and mitigation strategies used in cyber defense operations.
    Identification, detection, and analysis of potential computer network intrusions supporting the customers mission.
    Liaison with other government cyber threat analysis entities, such as intra-agency and inter-agency Cyber Threat Working Groups
    Meet and maintain customer required Information Assurance training compliance

    Required Skills:
    Must be a U.S. Citizen
    Must have active/current Top-Secret clearance with the ability to obtain a TS/SCI.
    Must be able to receive DHS suitability prior to starting employment.
    8+ years of directly relevant experience (SOC/CIRT Analyst, Forensics Analyst, Penetration Tester, or Threat Hunt Analyst)
    Current experience with AWS security solutions and cloud security investigations
    Current incident response experience using Splunk
    Previous experience with penetration testing (red/blue/purple teams)
    Previous security investigation experience (OS Forensics, Network Forensics, Web Application Forensics, Cloud Forensics, etc.)
    Experience as a Linux/Windows/Network administrator
    Must be able to work collaboratively across agencies and physical locations
    Excellent oral and verbal communication

    Desired Skills:
    Computer network surveillance/monitoring
    Knowledge and understanding of network protocols, network devices, multiple operating systems, and secure architecture
    Experience in computer evidence seizure, computer forensic analysis, and data recovery
    Computer network forensics
    System log analysis
    Current experience with cyber threats and the associated tactics, techniques, and procedures used to infiltrate computer networks
    Hands-on experience in the detection, response, mitigation, and/or reporting of cyber threats and 2 or more of the following:
    Computer network surveillance/monitoring.
    Knowledge and understanding of (TCP/IP) protocols, network devices, multiple operating systems, and secure architectures.
    System/Application/Security log analysis.
    Network traffic analysis.
    Current experience with AWS security solutions and cloud security investigations
    Hands-on experience as a SOC Detection Analyst, Threat Hunter, Forensic Examiner, or Incident Responder
    Proven exceptional technical writing skills directly related to cybersecurity incident response.

    Desired Certifications:
    DoD M Compliance at IAT Level I (e.g., Certified Information Systems Security Professional (CISSP)) certification required.
    Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP) or similar certification required.
    Information Systems Security Engineering Professional (ISSEP) or Information System Security Architect Professional (ISSAP) certification preferred.
    SourceFire Certified Professional (SFCP) certification desiredSkill Level 1 Certification (SANS GCIH or equivalent certification)
    Skill level 2 certification (SANS GCFA, GCFR, or equivalent certifications)
    Splunk Enterprise Security Certified Administrator or higher
    AWS Certified Practitioner or higher

    Required Education:
    BS Computer Science, Computer Engineering, Computer Information Systems, OR Computer Systems Engineering. Two years of related work experience may be substituted for each year of degree level education. "

    We have other current jobs related to this field that you can find below

  • University of Utah

    Sr Research Analyst

    3 weeks ago


    University of Utah Pensacola, United States

    University of Utah · Sr Research Analyst · Salt Lake City , · Utah · Apply Now · Pay Rate Range · $47,600.00-$84,249.00 based up experience · Close Date · Open Until Filled · Yes · Job Summary · The role involves conducting advanced statistical analyses of both qualitative ...

  • Solutions³ LLC

    Cyber Engineer

    1 week ago


    Solutions³ LLC Pensacola, United States

    Job Description · Job DescriptionCyber Engineer - Principal I - SCE05 · Solutions3 is supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introduci ...


  • Gov Solutions Group Pensacola, United States

    Gov Solutions Group · C3BM Senior Systems Analyst · Huntsville , · Alabama · Apply Now · GovSG is looking for a proven C3BM Senior Systems Analyst to join our team In this role you will get to engage in Command, Control, Battle Management, and Communications (C2BMC) technica ...


  • Amentum Milton, United States

    The **Database Administrator Senior** is the subject matter expert on NALCOMIS OOMA operations. Oversees all aspects of the NALCOMIS OOMA to include all System and Database functions and capabilities. Ensures 100% accuracy within the NALCOMIS database. Ensures all baseline change ...