Caelum Research Corporation ยท 12 hours ago
Computer Network Defense (CND) Analyst with Security Clearance
Maximize your interview chances
Information TechnologyRobotics
No H1BSecurity Clearance Required
Insider Connection @Caelum Research Corporation
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Performs actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks.
Employs Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation, coordination and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
Must possess a current DOD Top Secret Clearance and be eligible for SCI access
DOD Approved 8570/8140 Baseline Certification: Category IAT Level II (acceptable certifications are: CompTIA Sec+ CE, CompTIA CySA+, CCNA Security, GICSP, GSEC, SSCP)
DOD Approved 8570/8140 CSSP Certification: CSSP-IR (acceptable certifications are: CompTIA CySA+, CompTIA PenTest+, CEH, CFR, GCFA, GCIH and SCYBER)
Must possess written and verbal skills to appropriately document and brief Cybersecurity Incidents
Working knowledge of at least two cybersecurity areas: Firewall, IDS/IPS, Host based antivirus, Vulnerability Management, Forensics, Malware Analysis, Device Hardening
Understanding of Defense-in-Depth
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python