Z FEDERAL
Cyber Defense Analyst - Senior
Z FEDERAL s seeking a Cyber Defense Analyst - Senior to work in our Washington, DC office to support a full range of cyber security services. The position is full time and will support a US Government civilian agency. This position requires an
Active Top Secret Clearance
and 6+ years of relevant work experience . Job Requirements Strong written and verbal communication skills with excellent attention to detail Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). Ability to conduct independent analysis with minimal assistance on events generated by SIEM and individual security tools. Ability to create custom detection rules to query log data for indicators of compromise. Experience conducting security event analysis from beginning to end and determining root cause. Experience creating and reviewing standard operating procedures with minimal supervision and oversight. Ability to mentor junior personnel and provide guidance on analysis that may exceed the capabilities of junior analysts. Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). Knowledge of incident response and handling methodologies. Knowledge of incident categories, incident responses, and timelines for responses. Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Experience with system administration, network, and operating system hardening techniques. Knowledge of cyber defense and information security policies, procedures, and regulations. Knowledge of the common attack vectors on the network layer. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). In-depth understanding of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of various types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Develop content for cyber defense tools. Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. Coordinate with enterprise-wide cyber defense staff to validate network alerts. Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. Perform cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. Identify and analyze anomalies in network traffic using metadata. Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. Salary Range: $107,000 - $124,000 Required Skills Bachelors degree or higher 6+ years' experience in Network/data analysis, packet capture analysis, malware detection, custom intrusion signature development, advanced information assurance Certifications addressing incident handling (identification, overview, and preparation) buffer overflow, client attacks, covering tacks (networks, systems), denial of service attaches, incident handing (containment, eradication, recovery, and lessons learned), network attacks, password attacks, reconnaissance, scanning (discovery and mapping, techniques and defense), session hijacking and cache poisoning, techniques for maintaining access, web applications attacks, worms, bots, and bot-nets Active TS/SCI clearance Desired Skills Experience in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Ability to analyze malware and conduct vulnerability scans and recognize vulnerabilities in security systems. Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Experience evaluating the adequacy of security designs. Skill in using incident handling methodologies. Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies. Experience with using protocol analyzers and collecting data from a variety of cyber defense resources. Experience reading and interpreting signatures (e.g., snort). Experience with assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.) Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Z FEDERAL
offers: Self-directed 401K and annual company match Up to four weeks of paid time off (PTO) 11 paid federal holidays Other forms of leave such as bereavement, jury duty, military leave Full Health Benefits: Medical and Vision, Dental (employee-paid) Life Insurance Short and Long Term Disability, AD&D Insurance Flexible Spending Account (Medical and Dependent Care) Performance-based bonuses Tuition Reimbursement Incentive and referral bonuses Commuter benefits Professional Development and Training Years of Service Reward and Recognition Program Z FEDERAL
's commitment to employee growth and development is proven and valued by our staff. We want our employees to excel, grow professionally, and take on increasingly responsible roles.
#J-18808-Ljbffr
Active Top Secret Clearance
and 6+ years of relevant work experience . Job Requirements Strong written and verbal communication skills with excellent attention to detail Ability to interpret the information collected by network tools (e.g. Nslookup, Ping, and Traceroute). Ability to conduct independent analysis with minimal assistance on events generated by SIEM and individual security tools. Ability to create custom detection rules to query log data for indicators of compromise. Experience conducting security event analysis from beginning to end and determining root cause. Experience creating and reviewing standard operating procedures with minimal supervision and oversight. Ability to mentor junior personnel and provide guidance on analysis that may exceed the capabilities of junior analysts. Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins). Knowledge of incident response and handling methodologies. Knowledge of incident categories, incident responses, and timelines for responses. Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Experience with system administration, network, and operating system hardening techniques. Knowledge of cyber defense and information security policies, procedures, and regulations. Knowledge of the common attack vectors on the network layer. Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). In-depth understanding of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). Knowledge of various types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN). Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip). Knowledge of front-end collection systems, including traffic collection, filtering, and selection. Develop content for cyber defense tools. Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. Coordinate with enterprise-wide cyber defense staff to validate network alerts. Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level. Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. Perform cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy. Identify and analyze anomalies in network traffic using metadata. Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools. Salary Range: $107,000 - $124,000 Required Skills Bachelors degree or higher 6+ years' experience in Network/data analysis, packet capture analysis, malware detection, custom intrusion signature development, advanced information assurance Certifications addressing incident handling (identification, overview, and preparation) buffer overflow, client attacks, covering tacks (networks, systems), denial of service attaches, incident handing (containment, eradication, recovery, and lessons learned), network attacks, password attacks, reconnaissance, scanning (discovery and mapping, techniques and defense), session hijacking and cache poisoning, techniques for maintaining access, web applications attacks, worms, bots, and bot-nets Active TS/SCI clearance Desired Skills Experience in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Ability to analyze malware and conduct vulnerability scans and recognize vulnerabilities in security systems. Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. Experience evaluating the adequacy of security designs. Skill in using incident handling methodologies. Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies. Experience with using protocol analyzers and collecting data from a variety of cyber defense resources. Experience reading and interpreting signatures (e.g., snort). Experience with assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.) Ability to accurately and completely source all data used in intelligence, assessment and/or planning products. Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Z FEDERAL
offers: Self-directed 401K and annual company match Up to four weeks of paid time off (PTO) 11 paid federal holidays Other forms of leave such as bereavement, jury duty, military leave Full Health Benefits: Medical and Vision, Dental (employee-paid) Life Insurance Short and Long Term Disability, AD&D Insurance Flexible Spending Account (Medical and Dependent Care) Performance-based bonuses Tuition Reimbursement Incentive and referral bonuses Commuter benefits Professional Development and Training Years of Service Reward and Recognition Program Z FEDERAL
's commitment to employee growth and development is proven and valued by our staff. We want our employees to excel, grow professionally, and take on increasingly responsible roles.
#J-18808-Ljbffr