Cyber Security Analyst
Nabout Leidos
4 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
English Experience level
Senior Compensation
$ 195KJob location
Tech stack
Microsoft Access
Microsoft Word
Microsoft Excel
Microsoft Outlook
IP Addressing
Microsoft Office
Microsoft Servers
Network Monitoring
Windows Desktop
Virtual Environment
Cisco networks
VMware
Requirements
- Bachelor's degree in a relevant technical discipline and 8+ years of prior relevant experience.\n
- Currently possess an active DoD TS/SCI clearance and eligible for C/I Polygraph.\n
- Currently possess DoD 8750 certification at IAT level II, Security +ce.\n
- Experience at Joint Command and/or Operations Center.\n
- In-depth understanding of military orders and the military decision-making process.\n
- Proficient in Windows Desktop 7/ 8/ 8.1/ 10\n
- Knowledge of Windows server 2003/ 2008/ 2012 R2\n
- Ability to work in a virtual environment such as Microsoft Teams\n
- Knowledge of and a proficiency in using Computer and Microsoft Office applications (Word, Excel, Access, Outlook)\n
- Knowledge of policy development and maintenance\n
- Strong communication and interpersonal skills, with the ability to speak clearly and effectively with customers and technical personnel in high-stress situations\n
- A solid understanding of IP addressing and subnetting\n
- Understanding of key network monitoring protocols\n
- Proficient in Microsoft Office 365 Suite \u2022 Knowledge of Microsoft server operating systems, VMWare and Cisco network devices\n
Benefits & conditions
This position will support the DISA GSM-O II Task Number 07 (TN07). GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DoW and COCOMs. The selected candidate shall provide a stabilizing force to the high intensity, high tempo operations center. In depth technical knowledge, management, and analytic skills address senior command requirements, subordinate command information requirements, as well as supplements operations during a time of need.\n \n \nPrimary Responsibilities\n \n \n
- Provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies.\n
- Provide analysis of architectures, technologies, policies, information and analytic data used to determine prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.\n
- Prepare and perform briefings appropriate for senior leadership (i.e., general officer or flag officer)\n
- Perform cyber situational awareness activities and provide analysis and recommendations of situation awareness capabilities.\n
- Provide enterprise-wide cybersecurity, threat analysis, countermeasures and defensive strategies across a multi-tiered, porous domain inclusive of Cloud, federated regional gateways, cross domain peering points, internet access points, and endpoints.\n