Overview

Cyber Incident Monitoring Analyst – Senior Jobs in Beltsville, Maryland, USA at Peraton

Title: Cyber Incident Monitoring Analyst – Senior

Company: Peraton

Location: Beltsville, Maryland, USA

Type: Full Time

Category: IT/Tech, Security

Peraton

Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world’s leading mission capability integrator and transformative enterprise IT provider, we deliver trusted and highly differentiated solutions and technologies to protect our nation and allies.

Peraton is seeking to hire aCyber Incident Monitoring Analyst (Senior)to become part of Peraton’s Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enableinnovative, effective and secure business processes. This role supports the Cyber Incident Response Team (CIRT).

Location:Beltsville, MD.Required:Work on-site for the first 90 days. After the 90-day period, a hybrid schedule may be offered. The selected candidate must be able to support a hybrid and flexible schedule. This position will support Tuesday-Saturday from 2:00pm to 6:00pm.

Responsibilities

In this role you will:

Support the Cyber Incident Response Team (CIRT) and will be responsible for running day-to-day operations and analysis of the team.

Develop the overall maturity of the team both from a holistic and professional level.

Liaison between other CIRT teams and contract/government management.

Provide Monitoring support in a 24x7x365 environment.

Provideleadershipand mentoring to security analysts.

Share in-depth knowledge and intelligence gained from cybersecurity events with stakeholders.

Protect against and prevent potential cybersecurity threats and vulnerabilities.

Monitor and analyze network traffic to identify potential security threats and vulnerabilities.

Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.

Provide response, technical assistance and expertise for significant cyber incidents, investigations, and related operational events.

Develop and implement training programs for monitoring analysts.

Develop and maintain security policies, procedures, and documentation.

Conduct detailed research to increase awareness and readiness levels of the security operations center.

Conduct advanced analysis and recommend remediation steps.

Analyze network events to determine impact.

Conduct all-source research to determine threat capability and intent.

Develop and maintain analytical procedures to meet changing requirements.

Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

Work with stakeholders to resolve computer security incidents and vulnerability compliance.

Collaborate withcross-functional teamsto ensure compliance with security standards and best practices.

Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.

Qualifications

Required:

Bachelor’s degree with 5 years experience; 3 years with Masters; 0 years with PhD.

Must possess ONE of the following certifications or the ability to obtain before start date:CISSP-ISSAP, CISSP-ISSEP, CISSP, Security + CE, CySA+, PPDA, Agile IC, or SNOW App Dev.

U.S. Citizenshi…

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.