Search Jobvertise Jobs

Network Defense Analyst Linthicum, MD ref
Email this job to a friend

Report this Job

Report this job

Incorrect company
Incorrect location
Job is expired
Job may be a scam

Apply Online
or email this job to apply later

Network Defense Analyst Linthicum, MD ref
General Dynamics Mission Systems
was last active today
Direct hire
Skills : Information Technology, IT, Defense Analyst, Splunk, SIEM.

Network Defense Analyst



Bachelorís degree in a related specialized area or field or the equivalent is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.

Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.


Developing mission-critical systems that help keep people safe is what we do. At youíll be part of the team that helps heroes make a true impact. The work we do is important. The challenges we face are career-defining. The opportunity we can offer is one-of-a-kind.

seeking a Network Defense Analyst for the DC3 DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE). The analyst will join a newly formed XOP (eXternal Operations) Division. The successful candidate will perform threat monitoring, log event correlation analysis, traffic analysis, and digital forensics across diverse platforms to support intrusion detection and vulnerability discovery, reporting, and remediation. The analyst will monitor and integrate techniques from diverse sources and action the results in the evolving environment

Required Skills:

Network Defense Security Operation Center (SOC) experience
Knowledge of log, network, and system forensic investigation techniques
Strong experience performing network capture and netflow analysis for event correlation
Understanding threat-driven analysis methodologies across operating systems
Ability to monitor and integrate findings from open and proprietary sources to correlate to current threats, attack methodologies, and information technology security trends
Experience using Splunk, ELK, or other SIEM
Familiarity with script development using python to be able to integrate and analyze data from multiple platforms/APIs
Strong desire to bring new ideas to help challenging interoperability problems in government-commercial partnerships
DoD TS/SCI Clearance
Desired Skills:

Experience with network administration, pen-testing, or forensics background
Experience with log acquisition and analysis frameworks.

jonathan thompson
San Diego, CA 92126

Apply Online
or email this job to apply later

Search millions of jobs


Jobs by Title | Resumes by Title | Top Job Searches
Privacy | Terms of Use

* Free services are subject to limitations