Information Security Analyst
5 days left
- Full Time
General Dynamics Information Technology has an opening for an Information Security Analyst. The Analyst will provide security incident analysis in support of the IRS CSIRC operations. CSIRC Operations are based on a 24X7 schedule. The selected candidate will be required to work shift. Responsibilities include: Security Incident Analysis; incident/intrusion source tracing; root cause analysis; remediation/resolution recommendations; IDS/HIDS configuration analysis; and others. Analyst will be responsible for analyzing alerts; tuning signatures; reporting possible compromises; and end user/desktop support. Candidate will be part of a fast paced, highly skilled team that provides analysis to real-time event data to detect, analyze and respond to security incidents.The individual will need to be able to document and communicate effectively with customers and internal teams, assist in the investigation of events and follow-up with corrective actions and reporting.The individual should have an investigative mindset that allows them to think out of the box as to why events are occurring and provide a rapid, but accurate, response to the emerging threats and trends.This individual needs be eager to learn about new exploits and vulnerabilities and communicate the new threats to peers and customers. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
- Performs Computer Security Incident Response activities for a large organization; coordinates with other government agencies to record and report incidentsMonitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediationRecognizes potential; successful; and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary informationEvaluate firewall change requests and assess organizational riskCommunicates alerts to agencies regarding intrusions and compromises to their network infrastructure; applications and operating systemsAssists with implementation of counter-measures or mitigating controlsEnsures the integrity and protection of networks; systems; and applications by technical enforcement of organizational security policies; through monitoring of vulnerability scanning devicesPerforms periodic and on-demand system audits and vulnerability assessments; including user accounts; application access; file system and external Web integrity scans to determine compliancePrepares incident reports of analysis methodology and resultsMaintains current knowledge of relevant technology as assignedParticipates in special projects as required