Overview
Cyber Network Defense Analyst Security Clearance Jobs in Stennis Space Center, Mississippi, USA at Leidos
Title: Cyber Network Defense Analyst Security Clearance
Company: Leidos
Location: Stennis Space Center, Mississippi, USA
Type: Full Time
Category: IT/Tech, Security
Position: Cyber Network Defense Analyst with Security Clearance
Location: Stennis Space Center
R- Description Leidos is seeking a Cyber Network Defense Analyst (CNDA) to
join our team
on a highly visible cyber security single-award IDIQ vehicle that provides Network Operations Security Center (NOSC) support, cyber analysis, application development, and a 24x7x365 support staff. The Network Operations Security Center (NOSC) is a U.S. Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the e nterprise. The NOSC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a shared customer incident tracking system and other means of coordination and
communication
. The Monitoring and Analysis team provide 24×7 support across 4 different shifts. We have front half shifts (day and night) and back half shifts (day and night). The front half shift will work 12-hour shifts from Sunday – Tuesday and alternating Wednesdays. The back half shift will work 12-hour shifts from Thursday – Saturday and alternating Wednesdays. Candidates must have the ability to work non-core hours, if necessary. Duties include network security monitoring and detection, proactively searching for threats, inspecting traffic for anomalies and new malware patterns, investigating and analyzing logs, providing analysis and response to alerts, and documenting activity in NOSC investigations and Security Event Notifications (SENs). Primary Responsibilities: * Manage and conduct
hands-on
technical detection, analysis, containment, eradication, and remediation as a member of the Incident Response team * Guide and mentor peers and subordinates to provide cross training * Ensure accountability and punctuality of security analysts assigned to your shift * Capture cybersecurity metrics that support executive-level briefings (daily, weekly, monthly) * Articulate daily challenges to the Government Watch Officer (GWO) * Analyze web and host logs for indications of compromise * Remediate and coordinate the remediation of infected or compromised devices * Ensure shift continuity during call-outs and emergencies * Compile incident reports, executive summaries, and analysis reports of intrusions and/or security events * Document and update processes, workflows, and technical guides * Perform simple firewall rule changes (after training) Clearance Required: * Must have TS/SCI clearance to start. TS clearances candidates will be considered. Preference to candidates with current/active TS/SCI clearance. * US Citizenship required Basic Qualifications: Candidates should also demonstrate the following: Bachelor’s Degree and 2-4 years of SOC analyst experience. Additional experience may be considered in lieu of a degree * Extensive knowledge of a SOC ’s/ NOSC ’s
purpose
and role within an organization * Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc) * Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc) . * Expertise with packet analysis tools such as Wireshark Certification Requirement: Sec+, CEH,…