Menu

Cyber Security Analyst

at Trace Systems in Scott AFB, Illinois, United States

Job Description

Trace Systems


Cyber Security Analyst

US-IL-Scott AFB

Job ID: 2024-5779
Type: Regular Full-Time
# of Openings: 1
Category: Intelligence/Cyber
Scott AFB, IL

Overview

Job Title: Cyber Security Analyst

Job Location: Scott AFB, IL

Security Clearance: Active, in-scope US Government issued: Top Secret clearance

Requisition Type: Funded

Due to the nature of the work and US Government required, US Citizenship is required.



Responsibilities

Trace Systems is actively recruiting for a Cyber Security Analyst to join our team based on-site at Scott AFB, IL.

Duties and responsibilities may include, but aren't limited to:

  • Cyber Threat Analysis on the DoD network
  • Network Traffic Analysis using packet capture programs
  • Conduct routine security audits for compliance
  • Respond to alerts and identify malicious threats on the DoD network
  • Upgrade network sensors and Security Information and Event Management systems as new threats are discovered
  • Manage IDS and IPS devices
  • Manage firewalls
  • Report findings to USCYBERCOM for review


Qualifications

  • 2+ years of Cyber Security or Information Assurance related experience.
  • Top Secret clearance - active, in-scope.
  • Due to the nature of the work and contract requirements, US Citizenship is required.
  • Current DoD 8570 IAT Level II certification (Security+, CCNA-Security, CySA+, etc.)
  • Knowledgeable of the life cycle of network threats, attacks, attack vectors.
  • Understanding of methods of exploitation and of intrusion set tactics, techniques and procedures (TTPs).
  • Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
  • Hands-on experience analyzing high volumes logs, network data (e.g. Netflow, FPC), and other attack artifacts in support of incident investigations.
  • In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. Nitro/McAfee Enterprise Security Manager, ArcSight, QRadar, LogLogic, Splunk).
  • Experience and proficiency with any of the following: Anti-Virus, HIPS, ID/PS, Full Packet Capture software, Host-Based Forensics, or Network Forensics.
  • Experience with malware analysis concepts and methods.
  • Unix/Linux command line experience.
  • Scripting and programming experience.
  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.
  • Willingness to perform shift work.

Desired Qualifications:

  • Advanced certifications such as SANS GIAC/GCIA/GCIH, CISSP, CASP and/or SIEM-specific training and certification. (CISSP or equivalent).


  • PI239488301



    Trace Systems is an Equal Opportunity Employer and does not discriminate against any applicants for employment based on their race, color, religion, sex (including pregnancy, sexual orientation, or gender identity), national origin, age, physical or mental disability, genetic information, veteran status, uniformed service member status, or any other status protected by law.
To view full details and how to apply, please login or create a Job Seeker account
How to Apply Copy Link

Job Posting: 11826382

Posted On: Apr 12, 2024

Updated On: Apr 12, 2024

Please Wait ...