Computer Network Defense (CND) - Detect - TS/SCI - RAF Molesworth

7 days left

Location
Molesworth, Cambridgeshire
Posted
May 18, 2017
Closes
May 31, 2017
Hours
Full Time
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.

 
  1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents
  2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation
  3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information
  4. Evaluate firewall change requests and assess organizational risk
  5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems
  6. Assists with implementation of counter-measures or mitigating controls
  7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices
  8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance
  9. Prepares incident reports of analysis methodology and results
  10. Provides guidance and work leadership to less-experienced technical staff members
  11. Maintains current knowledge of relevant technology as assigned
  12. Monitor Splunk for Alerts
  13. Monitor HBSS
  14. Monitor Fidelis
  15. Monitor IDS
  16. Develop Indicators for detecting
  17. Monitor Network Flows
  18. Review Device Logs
  19. Monitor DCO and Cybercom chat rooms for new indicators
  20. Initial Triage for Detected Incidents
  21. Daily Status report for Open Incidents
  22. Maintain Daily Operations Log for Incident Detection
  23. Develop content for Computer Network Defense (CND) tools
  24. Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
  25. Coordinate with enterprise-wide computer network defense (CND) staff to validate network alerts
  26. Monitor external data sources (e.g., computer network defense [CND] vendor sites, Computer Emergency Response Teams, SANS, Security Focus) to maintain currency of CND threat condition and determine which security issues may have an impact on the enterprise
  27. Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
  28. Perform computer network defense (CND) trend analysis and reporting
  29. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
  30. Provide daily summary reports of network events and activity relevant to computer network defense (CND) practices
  31. Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts
  32. Provide timely detection, identification, and alerts of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities
  33. Use computer network defense (CND) tools for continual monitoring and analysis of system activity to identify malicious activity
  34. Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information
  35. Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness)
  36. Determine appropriate course of action in response to identified and analyzed anomalous network activity
  37. Conduct tests of information assurance (IA) safeguards in accordance with established test plans and procedures
  38. Determine tactics, techniques, and procedures (TTPs) for intrusion sets
  39. Examine network topologies to understand data flows through the network
  40. Recommend computing environment vulnerability corrections
  41. Identify and analyze anomalies in network traffic using metadata
  42. Conduct research, analysis, and correlation across a wide variety of all source data sets (e.g., indications and warnings)
  43. Validate Intrusion Detection System (IDS) alerts against network traffic using packet analysis tools
  44. Triage malware
  45. Identify applications and operating systems of a network device based on network traffic
  46. Reconstruct a malicious attack or activity based on network traffic
  47. Identify network mapping and operating system fingerprinting activities
  48. Participates in special projects as required
Education Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience.

Qualifications
  1. 5-8 years of related experience in data security administration
  2. Comprehensive knowledge of data security administration principles, methods, and techniques
  3. Certification in one or more specific technologies may be required, depending on job assignment
  4. Requires familiarity with domain structures, user authentication, and digital signatures
  5. Requires understanding of firewall theory and configuration
  6. Requires understanding of DHS/DoD policies and procedures, including FIPS 199, FIPS 200, NIST 800-53, DHS 4300A SSH and other applicable policies
  7. Must possess and maintain a US Top Secret/SCI Security Clearance
  8. Must be able to achieve Security+ CE Certification (or equivalent) within 90 days of hire for positions requiring elevated privileges and ITIL V3 Foundation within six months of hire
  9. Additional specific certifications may be required
  10. This position may be required to complete short-term deployments to austere locations worldwide
  11. The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes or equipment
The above job description is not intended to be, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job

 

Requests for reasonable accommodations will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job

 As a trusted systems integrator for more than 50 years, General Dynamics Information Technology provides information technology (IT), systems engineering, professional services and simulation and training to customers in the defense, federal civilian government, health, homeland security, intelligence, state and local government and commercial sectors.With approximately 32,000 professionals worldwide, the company delivers IT enterprise solutions, manages large-scale, mission-critical IT programs and provides mission support services.GDIT is an Equal Opportunity/Affirmative Action Employer - Minorities/Females/Protected Veterans/Individuals with Disabilities.