--
V2x

Job Details

Job Description

Roles & Responsibilities

The Defensive Cyber Operations (DCO) division within the USARCC-SWA is looking for a candidate with strong scripting abilities, experience with systems security administration, and network security technologies. The Cyber Threat Analyst will design, implement, automate, maintain, and optimize measures protecting systems, networks, and information.

You must satisfy all host country requirements to legally work in the host country to include but not limited to the ability to obtain and maintain a host nation visa and host nation driver s license in order to be qualified for this position.


Responsibilities
  • Monitor, detect, analyze, and correlate events for potential threat activity using Security Information Event Management (SIEM) systems, Big Data Analytics, and other supporting platforms or applications.
  • Investigate and identify the cause, source, and methodology of compromises or incidents.
  • Initiate computer incident handling procedures to isolate and investigate potential network information system compromises.
  • Perform trend analysis on events and incidents to identify and characterize threats.
  • Conduct open-source research to identify commercial exploits or vulnerabilities (i.e., Zero - Day) requiring response actions.
  • Prepare formal comprehensive reports and presentations for both technical and executive audiences.
  • Configure and optimize software and hardware detection and prevention capabilities.
  • Perform host and network-based signature development and standardization for implementation on end-point products or sensor grid.
  • Develop, document, and refine Tactics, Techniques, and Procedures (TTP).
  • Provide support to the Computer Defense Assistance Program (CDAP).
  • Collaborate on the continuous improvement and optimization of DCO strategies and countermeasures.
  • Stay informed about the latest cybersecurity threats, technologies, and best practices.
  • Collaborate with cross-functional teams to enhance overall DCO posture.
  • Maintain up-to-date knowledge of relevant compliance requirements and ensure adherence.
  • Assist in incident response planning, coordination, execution, and reporting.
  • Collaborate with external organizations and agencies to share threat intelligence and enhance DCO capabilities.
  • Performs other duties and assignments as required.

Qualifications
  • Qualifications
  • Security Clearance:
    • Requires an active Top Secret Clearance with SCI
  • Education / Certifications: One year of related experience may be substituted for one year of education, if degree is required.
    • Bachelors Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
    • This position requires candidates to adhere to DoD 8570.01M.
    • All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline Environment (BE) certifications cannot also be used as a Computing Environment (CE) certification.
    • The authorized certifications for this job title are listed as follows:
  • Baseline:
    • Cisco: CCNA: Certified Network Associate Security
    • Cisco: CyberOps Professional
    • Cisco: SCYBER: Cybersecurity Specialist
    • CompTIA: Cloud+ ce
    • CompTIA: CySA+ ce: Cybersecurity Analyst
    • CompTIA: PenTest+ ce
    • CyberSec: CFR: First Responder
    • EC-Council: CEH: Certified Ethical Hacker
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler
    • GIAC: GICSP: Industrial Cyber Security Professional
  • Computer Environment (CE):
    • Cisco: CCNP: Certified Network Professional (Any)
    • EC Council: ECIH: Certified Incident Handler
    • EC-Council: CHFI: Certified Hacking Forensic Investigator
    • GIAC: GCDA: Certified Detection Analyst (Preferred)
    • GIAC: GCFA: Certified Forensic Analyst
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler
    • GIAC: GCWN: Certified Windows Security Administrator
    • GIAC: GDAT: Defending Advanced Threats
    • GIAC: GREM: Reverse Engineering Malware
    • GIAC: GSEC: Security Essentials
    • Offensive Security: Certified Expert
    • Offensive Security: Certified Professional
  • Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience.
    • At least five (5) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security, cyber threats and SIEM event analysis.
    • Experience with a customer service-oriented company.
  • Skills & Technology Used:
    • Ability to troubleshoot servers and infrastructure equipment.
    • Ability to assess networking requirements and provide solutions.
    • Ability to make accurate and independent decisions under pressure.
    • Ability to perform comfortably in a fast-paced, deadline-oriented work environment.
    • Ability to successfully execute many complex tasks simultaneously.
    • Visualization of quantitative (numerical) or qualitative information.
    • Excellent interpersonal, organizational, written and verbal communication, and briefing skills.
    • Excellent analytical and problem-solving skills.
    • Threat Intelligence and visualization technologies.
    • Security enclave engineering.

Desired Candidate Profile

  • Qualifications
  • u>Security Clearance:
    • Requires an active Top Secret Clearance with SCI
  • Education / Certifications: One year of related experience may be substituted for one year of education, if degree is required.
    • Bachelors Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
    • This position requires candidates to adhere to DoD 8570.01M.
    • All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline Environment (BE) certifications cannot also be used as a Computing Environment (CE) certification.
    • The authorized certifications for this job title are listed as follows:
  • Baseline:
    • Cisco: CCNA: Certified Network Associate Security
    • Cisco: CyberOps Professional
    • Cisco: SCYBER: Cybersecurity Specialist
    • CompTIA: Cloud+ ce
    • CompTIA: CySA+ ce: Cybersecurity Analyst
    • CompTIA: PenTest+ ce
    • CyberSec: CFR: First Responder
    • EC-Council: CEH: Certified Ethical Hacker
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler
    • GIAC: GICSP: Industrial Cyber Security Professional
  • Computer Environment (CE):
    • Cisco: CCNP: Certified Network Professional (Any)
    • EC Council: ECIH: Certified Incident Handler
    • EC-Council: CHFI: Certified Hacking Forensic Investigator
    • GIAC: GCDA: Certified Detection Analyst (Preferred)
    • GIAC: GCFA: Certified Forensic Analyst
    • GIAC: GCIA: Certified Intrusion Analyst
    • GIAC: GCIH: Certified Incident Handler
    • GIAC: GCWN: Certified Windows Security Administrator
    • GIAC: GDAT: Defending Advanced Threats
    • GIAC: GREM: Reverse Engineering Malware
    • GIAC: GSEC: Security Essentials
    • Offensive Security: Certified Expert
    • Offensive Security: Certified Professional
  • Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience.
    • At least five (5) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security, cyber threats and SIEM event analysis.
    • Experience with a customer service-oriented company.
  • Skills & Technology Used:
    • Ability to troubleshoot servers and infrastructure equipment.
    • Ability to assess networking requirements and provide solutions.
    • Ability to make accurate and independent decisions under pressure.
    • Ability to perform comfortably in a fast-paced, deadline-oriented work environment.
    • Ability to successfully execute many complex tasks simultaneously.
    • Visualization of quantitative (numerical) or qualitative information.
    • Excellent interpersonal, organizational, written and verbal communication, and briefing skills.
    • Excellent analytical and problem-solving skills.
    • Threat Intelligence and visualization technologies.
    • Security enclave engineering.

Similar Jobs

About V2x
Kuwait, Capital Governorate (Kuwait)
Mechanical or Industrial Engineering