Job description
The Cyber Defense Analyst II uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. Identifies, triages, and reports events that occur in order to protect data, information systems, and infrastructure. Finds trends, patterns, or anomaly correlations utilizing security-relevant data. Recommends proactive security measures. Conducts analysis to isolate indicators of compromise. Notify designated managers, cyber incident responders, and cybersecurity service provider team member of suspected cyber incidents and articulate the event’s history, status, and potential impact for further action in accordance with the organization’s cyber incident response plan.
Required Skills
- Use cyber defense tools to monitor, detect, analyze, categorize, and perform initial triage of anomalous activity
- Generate cybersecurity cases (including event’s history, status, and potential impact for further action) and route as appropriate
- Leverage knowledge of commonly used network protocols and detection methods to defend against related abuses
- Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)
- Perform advanced manual analysis to hunt previously unidentified threats
- Conduct PCAP analysis
- Identify cyber-attack phases based on knowledge of common attack vectors and network layers, models, and protocols
- Apply techniques for detecting host- and network-based intrusions
- Working knowledge of enterprise-level network intrusion detection/prevention systems and firewall capabilities
- Understand the foundations of a hardened windows network and what native services and protocols are subject to abuse (such as RDP, Kerberos, NTLM, WMI, and SMB)
- Familiarity with fragmentation of network traffic and how to detect and evaluate fragmentation related attacks in raw packet captures
- Conduct network – traffic, protocol and packet-level – and netflow analysis for anomalous values that may be security-relevant using appropriate tools (such as Wireshark, tshark, tcpdump)
- Understand snort filters and how they are crafted and tuned to feed IDS alerting
- Understand system and application security threats and vulnerabilities to include buffer overflow, SQL injection, race conditions, covert channel, replay and return-oriented attacks, malicious code and malicious scripting
- Analyze malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
- Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
- Familiar with indications of Command and Control (C2) channels and what strategies attackers use to bypass enterprise defenses from a compromised host
QUALIFICATIONS Bachelor’s degree in a related field, plus two (2) years of professional experience is required. Four (4) years of experience is acceptable is candidate does not possess a degree. One (1) year of demonstrated and practical experience in TCP/IP fundamentals. One (1) year of demonstrated experience with network traffic analysis tools such as Bricata, tcpdump, or Wireshark. Two (2) years of demonstrated experience using security information and event management suites (such as Splunk, ArcSight, Kibana, LogRhythm). Two (2) years of demonstrated experience in network analysis and threat analysis software utilization. Two (2) years of demonstrated experience maintaining or managing Cloud environments such as Microsoft Azure, Amazon Web Services (AWS), using tools like Microsoft Sentinel.
CERTIFICATIONS & TECHNICAL PROFICIENCIES Requires DoD 8570 compliance with CSSP Analyst baseline certification. Information Assurance Technical (IAT) Level I (possess one: A+ CE, CCNA-Security, CND, Network+ CE, SSCP) or Level II (possess one: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) certification. Computing Environment (CE) certification, which can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications. Requires successful completion of the Splunk software training course "Fundamentals 1".
About Black Eagle Defense
Black Eagle Defense is a Maryland-based small business that provides Information Technology, Cybersecurity, and related Consulting Services to the private and public sectors. Our team is composed of highly trained professionals with a commitment to continued learning, versatility, and adaptability within the ever-evolving technological landscape.
We are proud to be an Equal Employment Opportunity and Affirmative Action employer.
colinoncars.com is the go-to platform for job seekers looking for the best job postings from around the web. With a focus on quality, the platform guarantees that all job postings are from reliable sources and are up-to-date. It also offers a variety of tools to help users find the perfect job for them, such as searching by location and filtering by industry. Furthermore, colinoncars.com provides helpful resources like resume tips and career advice to give job seekers an edge in their search. With its commitment to quality and user-friendliness, colinoncars.com is the ideal place to find your next job.