View all jobs

Cyber Fusion Analyst

Fort George G Meade, MD · Information Technology
• Identify and characterize cyber threats to Department of Defense Information Networks (DODIN) through intelligence, operational reporting, and network information Centrally coordinate and/or recommend CND operations that impact more than one DoD Component.
• Search for known Indicators of Compromise (IOC) and correlate activity to determine scope of possible compromise Identify tactics, techniques and procedures used by cyber actors.
• Provide Defense-wide situational awareness and attack sensing and warning through fusion, analysis and coordinated information flows.
• Utilize open source intelligence platforms to aid in identification of threats/compromise; coordinate closely with Intelligence Analyst to determine threats to the DODIN.
• Hunt for adversary activity on DoD networks via log, network, and packet analysis.
• Provide Defense-wide situational awareness and attack sensing and warning through fusion, analysis and coordinated information flows.
• De-conflict Vulnerability Analysis and Assessments (VAA) and Red Teaming with CND operations, and recommend changes to in progress or planned VAAs that may negatively impact CND operations.
• Recommend Information Operations Conditions (INFOCON) changes in response to unauthorized activity (e.g., computer network attacks, computer network exploitation, system misuse), and to mitigate potential damage to DoD information systems and computer networks. Required Experience/Qualifications
• Experience coordinating and/or recommending CND operations that affect more than one DoD Component.
• Experience conducting Packet Capture (PCAP) Analysis
• Experience with security information and event management (SIEM) systems
• Basic understanding of intelligence tools
• DOD 8570 IAT Level II: GSEC, CYSA+,CCNA Security, GICSP, SSCP, Security+
• Experience with and/or a working knowledge of the following :
   o Networking infrastructure: routers, switches, and web security gateway
   o TCP/IP Protocols and Services
   o Identification and Access Management
   o Firewalls, Access Control Lists
   o Intrusion Detection/Prevention Systems (IDS/IPS) Configuration Management
   o Demilitarized Zone (DMZ)
   o SIEM and JIMS Reports
   o Data backup/Data Loss Prevention (DLP)
   o Host Base Security Systems (HBSS)

Preferred Experience/Qualifications
• Critical/logical thinking skills.
• Experience working with the Intelligence Community and priority intelligence requirements.
• Advanced communications and presentations skills (verbal and written) enabling precise conveyance of information across all CC/S/A/FA with command and proper enunciation of the English language.
• Experience with the following Tools:
   o Wireshark
   o Splunk
   o Web Vulnerability Scanners
   o Threat Intelligence Platforms

Special Requirements/Security Clearance
• DOD TS/SCI eligibility is required

More Openings

Software Engineer (Level 2)
Systems Administrator (Level 2)
Systems Engineer (Level 2)
Vulnerabilities Analyst

Share This Job

Powered by