Tier 2 Security Monitoring Analystother related Employment listings - Bluemont, VA at Geebo

Tier 2 Security Monitoring Analyst

Description
Job Description:
No two career paths will ever look the same.
AtLeidos,we know the most talented and diverse IT and cyber security professionals will always have a multitude of career choices; your time at Leidos will be a wise investment in your career and in yourself.
We welcome your perspective and ideas, in order to foster collaboration and deliver world-class solutions.
We look for solutions that not only transform businesses, but change the world.
Department of Homeland Security (DHS), Federal Emergency Management Agency (FEMA) Security Operations Center (SOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to FEMA networks through monitoring, intrusion detection and protective security services to FEMA information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations.
The FEMA SOC is responsible for the overall security of FEMA Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.
The DHS FEMA SOC Program has a critical need for Tier 2 SOC Analysts.
This is a full time position based in Bluemont, VA (Mount Weather).
This position does not have Telecommuting Options.
Tier 2 Analyst should have expertise in one of the following specialized areas:
- Email security - Digital media forensic - Monitoring and detection - Incident Response - Vulnerability assessment and pen test - Cyber intelligence analysis Required Skills:
Minimum of current Secret clearance, Top Secret preferred with ability to obtain TS/SCI Clearance.
In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
Bachelors' degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and minimum of 4 years of professional experience in incident detection and response, malware analysis, or cyber forensics.
Additional years of experience and Cyber Certifications may be considered in lieu of a degree.
Professional experience should included specialized experience in one or more of the following areas:
Email security, Digital media forensics, Monitoring and detection, Incident Response, Vulnerability assessment and pen test, Cyber intelligence analysis.
Should have at least one of the following certifications:
SANS GIAC:
GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council:
CHFI, LPT, ECSA, Offensive Security:
OSCP, OSCE, OSWP and OSEE EnCase:
EnCE Dod 8570:
IAT L3, CNDSP Analyst or IR Carnegie Mellon:
CCSIHExtensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
Desired Skills:
Experience in cyber government, and/or federal law enforcement.
Experience with Cyber Kill Chain.
Experience in cybergovernment, and/or federal law enforcement.
Experience with Cyber Kill Chain.
Pay Range:
CategoryInformation Security Analysts EducationBachelor's Degree Experience4 to 20
years Job typeFull time.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.