Cyber Monitoring and Analysis Lead

Location
Washington, DC
Posted
Jan 12, 2017
Closes
May 06, 2017
Function
Analyst
Hours
Full Time
Security Operations Center (SOC) Lead for Monitoring and Event Analysis.

 

Performs monitoring and analysis of various security solutions to detect the precense of unknown or suspected cyber threats.

 Provides technical advice and guidance on installation, adaptation, configuration and/or enhancement of company technical products, programs and systems.

 

Provides expertise and recommedations for resolving technical problems, documenting processes and procedures to be used for cybersecurity monitoring and event analysis.

 

Lead activities related to monitoring and event analysis.

 

Modifies products, programs and systems to customer requirements.

 

Serves as company liaison with customer on administrative and technical matters for assigned projects.

 

Provides end-user training.

 

Performs various tests, validates and documents results.

 

Schedules work to meet completion dates and technical specifications;

 

Provides guidance and work leadership to less-experienced engineers and technicians, and may have supervisory responsibilities.

 

May serve as technical team or task lead.

 

Maintains current knowledge of relevant technologies as assigned.

 

Participates in special projects as required.

Education Bachelors of Sciences (Masters preferred) in Information Technology, Computer Science, Systems Engineering, Information Assurance, or related area.

 

 

Any of following SANS certifications: GCIH, GCFE, GCFA,GREM, GPEN, GWAPT, GXPN
Certified Information Systems Security Professional (CISSP)
Certified Computer Examiner (CCE)
Certified Computer Forensic Examiner (CCFE)

 

Qualifications Minimum of 6-10 years of experience in SOC analysis to include a minimum of 2-4 years’ experience as a Lead Analyst or SME.

 

Expert knowledge of policies, procedures, and protocols of a government Security Operations Center specifically related to performing event analysis and reporting.


Experience using and analyzing events from numerous security tools and technologies to include some of the following and/or closely comparable security technologies: McAfee Nitro SIEM, McAfee IDS/IPS, Imperva web application firewalls, McAfee Enterprise Antivirus, BlueCoat, Symantec DLP, Mandiant/Fireeye, Guardian MDB Protect, Cisco firewalls, QualysGuard, AppScan.

 Preferred Experience:
Experience at the U.S. Department of Treasury
Pervious lead security analyst experience at a federal agency similar in size, scope, and complexity.  #eg As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.