Jr. Info Security Analyst

Location
Washington, DC
Posted
Jan 12, 2017
Closes
Apr 01, 2017
Industry
Security
Hours
Full Time
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

  

 1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.

 2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.

 3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.

 4. Evaluate firewall change requests and assess organizational risk.

 5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.

 6. Assists with implementation of counter-measures or mitigating controls.

 7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.

 8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.

 9. Prepares incident reports of analysis methodology and results.

 10. Maintains current knowledge of relevant technology as assigned.

 11. Participates in special projects as required.

Education Candidates with a bachelor’s degree, professional experience or combination of education, professional experience and training are highly desired, but not required so long as the candidate has 2 years of related experience.

Qualifications 0-2 years of related experience in information technology and/or information security preferred (0 if a degree in Information technology or related field and 2 if no degree).

 

Candidates must be able to work a flexible schedule within a 24x7x365 Security Operations Center (SOC) environment, as well as may be expected to work holidays. A good candidate should have some or all of the following traits: Excellent analytical and problem solving skills as well as interpersonal skills to interact with customers, team members and upper management; an understanding of Cyber Security Incident Response and Network Security Monitoring; Fundamental understanding of computer networking (TCP/IP), knowledge of Windows, Linux and Cisco operating systems and information security; knowledge of Intrusion Detection System (IDS) and SIEM technologies; ArcSight ESM, Splunk, McAfee NSM, antivirus, Firewalls and Sourcefire and similar tools preferred. Knowledge and experience with scripting and programming (Python, PERL, etc.) are also highly preferred.

Unique/Additional Requirements

Desirable certifications include CompTIA Network+, Security+ and Linux+, SANs GSEC, GCIH, GCIA, GCFA, GPEN, GWAPT, GCFE, GSNA, GPPA, GCWN, GISF, GCED, GAWN, GXPN, GSSP, GWEB and GNFA. Offensive Security OSCP, OSCE, OSWP, OSEE. Carnegie Mellon SEI and Certified Incident Handler. ISC2 CCFP, CCSP, CISSP, CSSLP, SSCP. Cisco CCNA, CCNP, CCNA Security. EC Council C|EH, CHFI, LPT, ECSA, ECIH, CNDA, ECSS, ECSP, ECES. Microsoft MCSE. EnCase EnCE.