Search Jobvertise Jobs
Jobvertise

Network Defense Analyst Linthicum, MD ref
Location:
US-MD-Linthicum
Jobcode:
ref
Email this job to a friend

Report this Job

Report this job





Incorrect company
Incorrect location
Job is expired
Job may be a scam
Other







Apply Online
or email this job to apply later

Network Defense Analyst Linthicum, MD ref
General Dynamics Mission Systems
was last active today
Direct hire
Skills : Information Technology, IT, Defense Analyst, Splunk, SIEM.

Network Defense Analyst

COMPANY OVERVIEW:



BASIC QUALIFICATIONS:

Bachelor’s degree in a related specialized area or field or the equivalent is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.

CLEARANCE REQUIREMENTS:
Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.

JOB DESCRIPTION:

Developing mission-critical systems that help keep people safe is what we do. At you’ll be part of the team that helps heroes make a true impact. The work we do is important. The challenges we face are career-defining. The opportunity we can offer is one-of-a-kind.

seeking a Network Defense Analyst for the DC3 DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE). The analyst will join a newly formed XOP (eXternal Operations) Division. The successful candidate will perform threat monitoring, log event correlation analysis, traffic analysis, and digital forensics across diverse platforms to support intrusion detection and vulnerability discovery, reporting, and remediation. The analyst will monitor and integrate techniques from diverse sources and action the results in the evolving environment



Required Skills:

Network Defense Security Operation Center (SOC) experience
Knowledge of log, network, and system forensic investigation techniques
Strong experience performing network capture and netflow analysis for event correlation
Understanding threat-driven analysis methodologies across operating systems
Ability to monitor and integrate findings from open and proprietary sources to correlate to current threats, attack methodologies, and information technology security trends
Experience using Splunk, ELK, or other SIEM
Familiarity with script development using python to be able to integrate and analyze data from multiple platforms/APIs
Strong desire to bring new ideas to help challenging interoperability problems in government-commercial partnerships
DoD TS/SCI Clearance
Desired Skills:

Experience with network administration, pen-testing, or forensics background
Experience with log acquisition and analysis frameworks.

jonathan thompson
esr
confidential
San Diego, CA 92126

Apply Online
or email this job to apply later


 
Search millions of jobs

Jobseekers
Employers
Company

Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use


* Free services are subject to limitations