Markesman Group ยท 5 hours ago
Cyberspace Defensive Analyst Level I with Security Clearance
Maximize your interview chances
Cyber SecurityInformation Technology
No H1BSecurity Clearance Required
Insider Connection @Markesman Group
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns.
Perform systems management and integration functions.
Improve existing computer systems.
Review computer system capabilities, workflow, and schedule limitations.
Coordinate network defense operations with DOD Component Commands/Services/Agencies/Field Activities or Intelligence Agencies or Law Enforcement, or U.S. Government organizations.
Perform research and analysis of cybersecurity capabilities to satisfy data protection requirements.
Demonstrate expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities including web content filters, and email security.
Coordinate and provide support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports.
Engage with FCC or DIB on network protection.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Bachelor's Degree in Information Systems Management, Computer Science, or related discipline.
TS/SCI w/ CI Poly
Minimum of three (3) years of experience providing support to include:
Coordinating network defense operations with DOD Component Commands/Services/Agencies/Field Activities or Intelligence Agencies or Law Enforcement, or U.S. Government organizations.
Performing research and analysis of cybersecurity capabilities to satisfy data protection requirements.
Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities including web content filters, and email security.
Coordination and providing support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports.
Engaging with FCC or DIB on network protection.