|
Search Jobvertise Jobs
|
Jobvertise
|
Network Defense Analyst Linthicum, MD ref Location: US-MD-Linthicum Jobcode: ref Email this job to a friend
Report this Job
Network Defense Analyst Linthicum, MD ref
General Dynamics Mission Systems
was last active today
Direct hire
Skills : Information Technology, IT, Defense Analyst, Splunk, SIEM.
Network Defense Analyst
COMPANY OVERVIEW:
BASIC QUALIFICATIONS:
Bachelor’s degree in a related specialized area or field or the equivalent is required plus a minimum of 5 years of relevant experience; or Master's degree plus a minimum of 3 years of relevant experience.
CLEARANCE REQUIREMENTS:
Department of Defense TS/SCI security clearance is required at time of hire. Applicants selected will be subject to a U.S. Government security investigation and must meet eligibility requirements for access to classified information. Due to the nature of work performed within our facilities, U.S. citizenship is required.
JOB DESCRIPTION:
Developing mission-critical systems that help keep people safe is what we do. At you’ll be part of the team that helps heroes make a true impact. The work we do is important. The challenges we face are career-defining. The opportunity we can offer is one-of-a-kind.
seeking a Network Defense Analyst for the DC3 DoD-Defense Industrial Base Collaborative Information Sharing Environment (DCISE). The analyst will join a newly formed XOP (eXternal Operations) Division. The successful candidate will perform threat monitoring, log event correlation analysis, traffic analysis, and digital forensics across diverse platforms to support intrusion detection and vulnerability discovery, reporting, and remediation. The analyst will monitor and integrate techniques from diverse sources and action the results in the evolving environment
Required Skills:
Network Defense Security Operation Center (SOC) experience
Knowledge of log, network, and system forensic investigation techniques
Strong experience performing network capture and netflow analysis for event correlation
Understanding threat-driven analysis methodologies across operating systems
Ability to monitor and integrate findings from open and proprietary sources to correlate to current threats, attack methodologies, and information technology security trends
Experience using Splunk, ELK, or other SIEM
Familiarity with script development using python to be able to integrate and analyze data from multiple platforms/APIs
Strong desire to bring new ideas to help challenging interoperability problems in government-commercial partnerships
DoD TS/SCI Clearance
Desired Skills:
Experience with network administration, pen-testing, or forensics background
Experience with log acquisition and analysis frameworks.
jonathan thompson
esr
confidential San Diego, CA 92126
|