Cyber Watch Analyst IV

Perspecta Inc. Herndon , VA 20171

Posted 2 months ago

Business Group Highlights

Intelligence

The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions.

Responsibilities

Working as expert, conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and customer information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.

  • 12-hour Day Shift schedule on the Computer Incident Response Team (CIRT) Watch Floor

  • Current shift open is every Thursday, Friday, and Saturday, and every other Wednesday. (84 hours over 2 weeks)

  • Collaborate between CIRT elements as necessary during incident detection and response stages

  • Respond promptly to all request for support whether telephonic, via e-mail or instant messenger

  • Create releasable finished intelligence products and reports for the IC as well as IC Senior Leadership

  • Maintain incident case management database for all reported incidents

  • Analyze incidents and events captured in the Case Management Database for trends, patterns, or actionable information

  • Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness

  • Leverage existing business processes and document new repeatable business processes and procedures where necessary

  • Research external information on events, incidents, outages, threats, and technical vulnerabilities

  • Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team

  • Assess incidents to identify type of attack, collect evidence, and assess impact

Qualifications

Required

  • Must have an active TS/SCI w/poly security clearance

  • 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD.

  • 3-5 years of Cyber Threat Analysis experience

  • Experience working within a Security or Network Operations Center

  • Experience working with Security incident and event management

  • Demonstrated proficiency in Windows and Linux environments

  • Demonstrated experience with drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis

Desired

  • BS degree in Cybersecurity, Information Security, Information Technology, Computer Science/Engineering, Network Engineering, or Computer forensics

  • Demonstrated proficiency with at least one of the following tools/techniques: ArcSight ESM, Splunk Enterprise, FireEye, SolarWinds, Remedy, and/or McAfee ePolicy

  • Relevant Certifications: Security +, CySA+, CASP+, CEH, CISSP, GCIA, Splunk Certified User

About Perspecta

What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector-from investigative services and IT strategy to systems work and next-generation engineering.

Our promise is simple: never stop solving our nation's most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector.

Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories.


icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Cyber Watch Floor Analyst IV Night Shift

Perspecta Inc.

Posted 2 months ago

VIEW JOBS 2/27/2020 12:00:00 AM 2020-05-27T00:00 Business Group Highlights Intelligence The Intelligence group provides high-end systems engineering and integration products and services, data analytics and software development to national and military intelligence customers. Serving federal agencies and the Intelligence Community for more than 50 years, the Intelligence group helps our clients meet their mission needs by providing trusted advisors, leading-edge technologies, and innovative solutions. Responsibilities Working as expert, conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and customer information networks. Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent. Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research and analysis of classified and open source information. Correlates threat data from various sources. Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations. Collects data using a combination of standard intelligence methods and business processes. Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials. * 12-hour Night Shift schedule on the Computer Incident Response Team (CIRT) Watch Floor from 6PM to 6AM * Shift schedule is every Thursday, Friday, and Saturday, and every other Wednesday. (84 hours over 2 weeks) * Collaborate between CIRT elements as necessary during incident detection and response stages * Respond promptly to all request for support whether telephonic, via e-mail or instant messenger * Create releasable finished intelligence products and reports for the IC as well as IC Senior Leadership * Maintain incident case management database for all reported incidents * Analyze incidents and events captured in the Case Management Database for trends, patterns, or actionable information * Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness * Leverage existing business processes and document new repeatable business processes and procedures where necessary * Research external information on events, incidents, outages, threats, and technical vulnerabilities * Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team * Assess incidents to identify type of attack, collect evidence, and assess impact Qualifications R Required * Must have an active TS/SCI w/poly security clearance * 8 to 10 years with BS/BA or 6 to 8 years with MS/MA or 3 to 5 years with PhD. * 3-5 years of Cyber Threat Analysis experience * Experience working within a Security or Network Operations Center * Experience working with Security incident and event management * Demonstrated proficiency in Windows and Linux environments * Demonstrated experience with drafting reports, documenting case details, and able to summarize findings and recommendations based on system analysis * Prior experience with Splunk. Desired * BS degree in Cybersecurity, Information Security, Information Technology, Computer Science/Engineering, Network Engineering, or Computer forensics * Demonstrated proficiency with at least one of the following tools/techniques: Splunk Enterprise, FireEye, SolarWinds, Remedy, and/or McAfee ePolicy * Relevant Certifications: Security +, CySA+, CASP+, CEH, CISSP, GCIA, Splunk Certified User About Perspecta What matters to our nation, is what matters to us. At Perspecta, everything we do, from conducting innovative research to cultivating strong relationships, supports one imperative: ensuring that your work succeeds. Our company was formed to bring a broad array of capabilities to all parts of the public sector-from investigative services and IT strategy to systems work and next-generation engineering. Our promise is simple: never stop solving our nation's most complex challenges. And with a workforce of approximately 14,000, more than 48 percent of which is cleared, we have been trusted to just that, as a partner of choice across the entire sector. Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories. Perspecta Inc. Herndon VA

Cyber Watch Analyst IV

Perspecta Inc.