Jr. Information Assurance/Security Specialist

Location
Washington, DC
Posted
Jan 12, 2017
Closes
Mar 24, 2017
Industry
Security
Hours
Full Time
This is for shift work 12 hour shifts 4 days on 4 days off.

 

  • Use SIEM technologies and other native tools to perform the monitoring of security events on a 24x7 basis.
  • Perform analysis on logs produced by network devices utilized within the OCC such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved OCC applications.Use the Intel McAfee SIEM to monitor the network and perform analysis, while integrating the results and information needed to proactively protect the OCC enterprise. This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations.Provide security events analysis and support to include identifying potential threat, anomalies, and infections, documenting findings, providing recommendations within the OCC’s incident management system, performing triage of incoming security events, performing preliminary and secondary analysis of those events, and validating the eventsPerform technical analyses, such as analysis of malicious code, network traffic, web log data, cyber intelligence, hard drives, and other storage and forensics media, to control exploitative activity.Manage inbound requests via the OCC ticketing system (Service Now), as well as via telephone calls, and provide security notifications via three methods: logging incident tickets, sending emails, and placing telephone calls
Education Bachelors of Science in Computer Science, Systems Engineering, Cybersecurity, Information Technology or related area.

 

Preferred Certifications: Certified Computer Examiner (CCE), Certified Computer Forensic Examiner (CCFE), Any of following SANS certifications: GCIH, GCFE, GCFA,GREM, GPEN, GWAPT, GXPN

 

 

Qualifications Qualifications:

Entry level knowledge of policies, procedures, and protocols of a government Security Operations Center.Work or educational experience using security tools and technologies to include some of the following and/or closely comparable security technologies: McAfee Nitro SIEM, McAfee IDS/IPS, Imperva web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant/Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, AppScanPreferred Qualifications:

Experience at the U.S. Department of TreasuryPrevious Senior SOC Analyst experience at a federal agency similar in size, scope, and complexity.#eg