Cyber Security Analyst Jr.

Clearance Level
None
Category
Cyber Security
Location
Huntsville, Alabama

REQ#: RQ58452

Travel Required: None
Public Trust: None
Requisition Type: Regular

We are looking for a Cyber Security Analyst Jr. to help plan, implement, and maintain a new Security Operations Center (SOC) program. This SOC will be responsible for providing cyber security services to customers. Services include, but are not limited to, Nessus vulnerability scanning and reporting; Juniper SRX firewall auditing and hardening; Juniper Cloud ATP IDS/IPS implementation, maintenance, and monitoring; SIEM implementation, maintenance, and monitoring; interfacing with customers in regard to security events and incidents; and delivering vulnerability reports to customers and stakeholders.

Overall goal is to help plan, implement, and maintain the SOC related to the following areas:

  • Vulnerability Management – Nessus vulnerability scanning and reporting
  • Splunk (or equivalent SEIM / log aggregation)
  • Juniper ATP Cloud- Basic familiarity with IDS and IPS setups
  • Juniper SRX firewall auditing and hardening
  • Incident Response Team (IR/IRT) troubleshooting, root cause analysis, and remediation verification

Primary Responsibilities:

  • Work closely with other SOC staff members
  • Follow direction from other SOC staff members to design and implement server and networking infrastructure to provide SOC services
  • Must be willing to provide/support SOC operations while dealing with customer incidents
  • Follow and update process improvements for the SOC in order to maintain operational readiness for incident response
  • Work as part of a 24x7x365 team delivering real time proactive monitoring and maintenance of supported security tools
  • Carry out triage on security events, coordinate incidents with SOC staff, network operations, network engineering, systems, and application teams while supporting and updating the incident management process
  • Identify and respond to incidents, to prevent or limit damage to assets, and report incidents
  • Detect and analyze incidents, coordinate activities with other stakeholders for containing, eradicating, and recovering from incidents
  • IDS monitoring and analysis, network traffic and log analysis, prioritization, and differentiation between potential intrusion attempts, determination of false alarms, insider threat and APT detection, and malware analysis/forensics
  • Understanding basic networking, sub-netting, IDS, NAT, ACL's, etc.
  • Delivering vulnerability reports and SIEM reports to customers and stakeholders

Possible additional responsibilities may include:

  • Help SOC staff to provide enterprise-wide management of security incidents, managed network space, to detect, respond, and report all computer related incidents that includes daily monitoring of information systems, vulnerability remediation, intrusion detection, log reviews, and malware tracking
  • Help SOC staff to coordinate all information security incidents compiled with timeline specifics
  • Help SOC staff to coordinate the development of reports from the SIEM, IDS/IPS, and vulnerability scanning
  • Help SOC staff to remain up to date with current attack methods and characteristics in order to identify threats and advise on prevention, mitigation and remediation
  • Help SOC staff to monitor and report on call volumes, alarm responses, and incident reports to ensure appropriate levels of service are met
  • Utilize guidance from IT leadership and teams to support operational issues and prepare for potential incidents
  • Support annual updates of the incident response concept of operations document
  • Support annual incident response tabletop exercises
  • Support and update standard operational procedures (SOPs) for use by all shift personnel
  • Perform other tasks consistent with the goals and objectives of the SOC and customers
  • Development of advanced analytics and countermeasures to protect critical assets

Ideal Qualifications:

  • Bachelor’s Degree plus 0 years of relevant work experience or 2 years of relevant work experience in-lieu of bachelor’s degree
  • Basic level Linux or Windows administration experience
  • Cyber Security educational or work experience

Additional Preferred Qualifications:

  • Experience with detecting, remediating, and reporting on cyber security events
  • Juniper firewall administration
  • Configuration Management - STIG/SCAP compliance baselines for Windows, Mac, Linux
  • Penetration Test Response and Remediation
  • DevSecOps – software development lifecycle security
  • Ansible automation planning and implementation
  • Experience with Nessus vulnerability scanning service
  • Experience with Juniper ATP Cloud and JunOS Space
  • Security+ certification
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.