Skip to main content

This job has expired

Security Analyst (ISSO)

Employer
Nava
Location
Washington, DC
Closing date
Apr 24, 2021

View more

Engineering and Software Development - Information Systems Security Officer (ISSO) / AnaVation is seekng a Security Analyst to support our mission critical customer in Washington, DC Position Requirements: Demonstrated experience with multiple tools providing security functions such as vulnerability management (eg Nessus, Retina), configuration management (eg Bigfix, SCCM, EPO), endpoint protection (eg antivirus, ATP), data loss prevention, and intrusion detection software and hardware. Demonstrated experience utilizing virtual machines to connect to and repair server-based applications as well as configure and distribute client agents. Ability to fully administer the applications assignee. Excellent oral and written communication skills and the ability to deliver in-person or virtual training that results in excellent assessment via trainee feedback. Familiarity with information security terminology and be able to develop or select technical training in the discipline of information security geared to an organization. Understanding of the role of interactive training such as phishing exercises for assessment of organizational abilities. Familiarity with NIST SP 800-181 guidance regarding cyber workforce roles and responsibilities. Familiarity with data management and reporting of training data and statistics using common tools such as Microsoft Excel. Demonstrated experience with the utilization of multiple tools providing security functions such as vulnerability management (eg Nessus, Retina), configuration management (eg Bigfix, SCCM, EPO), endpoint detection (eg antivirus, ATP), data loss prevention, and intrusion detection software and hardware. Familiarity with the various use cases and alignment of data from each tool to various security disciplines in configuration management, vulnerability management, risk management and incident management. Familiarity with the use of data analysis tools, including the use of Microsoft Excel or PowerBI to combine data from multiple sources. Familiarity with encryption technologies used in commercial operating systems, including Public Key Infrastructures, symmetric and asymmetric cryptography, certificate trust stores and the use of key escrow for discovery and legal purposes. Familiarity with the use of Transport Layer Security (TLS) to secure network communications, code signing certificates and Certificate Authorities (CA) for the administration of encryption trust certificates. Excellent written communication skills and the ability to review and comment on design documents while providing subject matter expert review. Familiarity with multi-tiered network applications, common ports and protocols used in those communications, the Common Vulnerability System (CVS) and the exploitation mechanisms of common vulnerability types (eg buffer overflows, cross-site-scripting, SQL injection). Ability to perform online research and comprehend attack signatures while comparing them to network traffic to perform proper analysis of detections. Ability to use common tools such as Wireshark to examine network traffic. Familiarity with protocols commonly used in commercial networks, such as Server Message Block (SMB), Remote Procedure Calls (RPC), Hypertext Transfer Protocol (HTTP) and Structured Query Language (SQL). Ability to perform Splunk queries to examine and query log data from the Enterprise Logging as a Service system. Familiarity with multi-tiered network applications, common ports and protocols used in those communications, the Common Vulnerability System (CVS) and the exploitation mechanisms of common vulnerability types (eg buffer overflows, cross-site-scripting, SQL injection). Ability to perform online research and comprehend attack signatures while comparing them to network traffic to perform proper analysis of detections. Ability to use common tools such as Wireshark to examine network traffic. Familiarity with protocols commonly used in commercial networks, such as Server Message Block (SMB), Remote Procedure Calls (RPC), Hypertext Transfer Protocol (HTTP) and Structured Query Language (SQL). Ability to perform Splunk queries to examine and query log data from the Enterprise Logging as a Service system Additional Qualifications: Bachelor's degree in a related field or equivalent demonstrated experience and knowledge 4 years' experience as a Security/Network Administrator or equivalent knowledge.

Get job alerts

Create a job alert and receive personalized job recommendations straight to your inbox.

Create alert