[Close] 

Information Assurance Specialist Network Security Analyst

Company Name:
Arca24.com
Salary period: Annual
Additional classifications: Engineering
TASC is seeking experienced professionals to join the Intelligence Solutions and Analytics (ISA) Sector. ISA provides specialized systems engineering, acquisition, and intelligence support to multiple Intelligence Community customers. The Information Assurance Specialists will provide security support services to the Agency's Cyber Security Operation Cell (CSOC) functional operations to perform 24x7x365 event monitoring, event investigating, and support the activities and equipment needed to safeguard computer infrastructure. Team will also provide the necessary Operations and Sustainment (O&S;) of the specialized equipment needed to perform the functions and manage the programs, described below:ΓΆΒ ΒΆ Conduct analysis for detecting and evaluating cyber events and/or intrusions.
ΓΆΒ ΒΆ Conduct briefings to senior leadership, as required by the government.
ΓΆΒ ΒΆ Monitor for potential compromise, intrusion, deficiency, significant event or threat to the security posture and security baseline.
ΓΆΒ ΒΆ Perform daily IDS and IPS analysis/monitoring and generating technical and executive summary reports.
ΓΆΒ ΒΆ Conduct incident response IAW DoD/IC policy (Chairman of the Joint Chiefs Staff Manual/CJCSM 6510, Intelligence Community Standard/ICS 502 and industry best practices such as NIST Special Publication 800-61).
ΓΆΒ ΒΆ Apply knowledge of information security services/analysis concepts, practices and procedures.
ΓΆΒ ΒΆ Research, design, develop, deploy, configure, administer, and maintain enterprise-wide Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Security Information/Event Management (SIEM) infrastructure.
ΓΆΒ ΒΆ Conduct analyses of existing solutions to incorporate requested enhancements.
ΓΆΒ ΒΆ Review/analyze requested changes for equipment, technology and/or other factors/trends, which may impact existing solution.
ΓΆΒ ΒΆ Research current cyber events and/or intrusions for impact to Agency systems.
ΓΆΒ ΒΆ Implement government IDS and IPS design/deployment with government approval.
ΓΆΒ ΒΆ Develop/write custom IDS and IPS signatures and update proprietary signatures with government approval.
ΓΆΒ ΒΆ Develop SOP and other technical documentation for the IDS infrastructure IAW with current government policy.
ΓΆΒ ΒΆ Consult with hardware, communications, database experts and /or vendors to ensure system viability.
ΓΆΒ ΒΆ Perform system design functions, including interpretive analyses, chart preparation and associated diagrams/enhancement plans for network security.
ΓΆΒ ΒΆ Prepare/conduct acceptance test plans and confirm accompanying results, including the development of vulnerability assessments and functionality. To be approved by the government.
ΓΆΒ ΒΆ Conduct briefings to senior leadership, as required by the government.
ΓΆΒ ΒΆ Follow intrusion and escalation processes and procedures IAW with current government policy.
Required Qualifications:
ΓΆΒ ΒΆ TS/SCI Clearance
ΓΆΒ ΒΆ Any Master's degree. Master's degree in Computer Information Systems, Computer Science, Information Technology, Information Science, Information Systems, or a related academic disciplines of science, technology, engineering, or mathematics preferred
ΓΆΒ ΒΆ 10-15 years experience with minimum 6 years experience in Incident Monitoring
ΓΆΒ ΒΆ DoD 8570 Management Level III. CISSP and/or CISM preferred
ΓΆΒ ΒΆ SourceFire Certified Professional (SFCP) or GIAC Certified Intrusion Analyst Certification (GCIA)
ΓΆΒ ΒΆ Intrusion Analyst Experience
ΓΆΒ ΒΆ Network Packet Traffic Analysis Experience
ΓΆΒ ΒΆ Intrusion Signature creation and writing
ΓΆΒ ΒΆ ISC2 recognized professional certifications
ΓΆΒ ΒΆ Demonstrated Experience in Cyber Intelligence briefing preparation and presentation
ΓΆΒ ΒΆ Demonstrated Experience in Cyber Intelligence Research

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Senior Analyst, Network Engineering (Infrastru...
O Fallon, MO Mastercard
DW - Server Systems Analyst
Saint Louis, MO St. Louis Community College
Sr Solution Sales Analyst (Enterprise print Pr...
Saint Louis, MO Canon U.S.A., Inc.
Client Server Technical Analyst
Chesterfield, MO DOT Foods
Product Liability Analyst
Kansas City, MO Allied Global Services
Nurse Analyst
Kansas City, MO Allied Global Services