Network Operations Security Center Analyst
ManTech - Jackson, Mississippi, United States
Work at ManTech
Overview
- View job
Overview
Mid-Level NOSC Analyst
role at
ManTech
2 weeks ago Be among the first 25 applicants
Join to apply for the
Mid-Level NOSC Analyst
role at
ManTech
ManTech
seeks a motivated, career and customer-oriented
Mid-Level NOSC Analyst
to join our team in
Stennis, MS .
In this role, you will provide daily management and oversight to a team of up to 40+ operators supporting network, cybersecurity, and cloud operations, as well as incident management on a 24x7x365 basis. You will conduct advanced network monitoring, incident response, and system troubleshooting to ensure that mission-critical IT infrastructure remains secure and operational. You will analyze escalated issues, coordinate with cross-functional teams to resolve network and security incidents, and support the implementation of cybersecurity measures in line with policies and standards.
Responsibilities include, but are not limited to:
Provide support in analyzing network traffic and log data to assess the status and potential threats against the network, recommend countermeasures, and track and report security events and incidents.
Monitor, detect, scan, record, audit, analyze, report, and remediate network and cybersecurity events across customer networks, infrastructure, and endpoints.
Conduct forensic analysis and detailed investigations of security incidents to determine root causes and extent of compromise; develop lessons learned and improve support processes.
Document analysis, findings, and actions in case/knowledge management systems.
Provide guidance, coaching, and knowledge sharing to team members to enhance their technical skills.
Assist senior NOSC personnel in creating and distributing incident reports.
Participate in vulnerability assessments and penetration testing to identify and mitigate security weaknesses.
Minimum Qualifications:
4+ years of experience in network and/or security operations, including roles such as CIRT, CERT, CSIRC, NOC, SOC, or NOSC.
Bachelor's degree in Information Security, Computer Science, or related field, plus at least 6 months of relevant experience in areas like network operations, penetration testing, forensic analysis, intrusion response, or network monitoring.
Possession of a Certified Ethical Hacker (CEH) or GIAC Certified Incident Handler (GCIH) certification, and compliance with DoD 8570 and/or 8140 Level II or III requirements.
Experience with incident response, forensic data handling, and maintaining legal chain of custody.
Hands-on experience with network monitoring/troubleshooting tools (e.g., Splunk, HBSS, Nessus) and familiarity with scripting languages (Python, PowerShell) and cloud platforms (AWS, Azure, GCP).
Preferred Qualifications:
Certifications such as CSSP Analyst, CSSP Infrastructure Support, CSSP Incident Responder, GIAC Certified Forensic Examiner (GCFE), or GIAC Advanced Smartphone Forensics (GASF).
Clearance Requirements:
Current/active Top Secret/SCI clearance.
Ability to obtain and maintain DHS EOD suitability prior to starting.
Physical Requirements:
Ability to work in an office environment and maneuver in data centers and IT equipment locations.
Constant operation of a computer and office machinery.
Ability to lift and carry up to 75 lbs for distances up to 50 feet.
Additional Details:
Seniority Level: Mid-Senior level
Employment Type: Full-time
Job Function: Business Development and Sales
Industries: IT Services and IT Consulting
#J-18808-Ljbffr