Cybersecurity Analyst @ UICGS / Bowhead Family of Companies | Jobright.ai
JOBSarrow
RecommendedLiked
0
Applied
0
Cybersecurity Analyst jobs in Dahlgren, VA
Be an early applicantLess than 25 applicants
expire-info-iconThis job has closed.
company-logo

UICGS / Bowhead Family of Companies · 2 days ago

Cybersecurity Analyst

Wonder how qualified you are to the job?

ftfMaximize your interview chances
IT Services and IT Consulting
check
Actively Hiring

Insider Connection @UICGS / Bowhead Family of Companies

Discover valuable connections within the company who might provide insights and potential referrals, giving your job application an inside edge.

Responsibilities

Conducting vulnerability scans and recognizing vulnerabilities in security systems.
Using DoD network analysis tools to identify vulnerabilities (e.g., ACAS, HBSS, etc.).
Conducting application vulnerability assessments.
Identifying systemic security issues based on the analysis of vulnerability and configuration data.
Sharing meaningful insights about the context of an organization’s threat environment that improve its risk management posture.
Applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Troubleshooting and diagnosing cyber defense infrastructure anomalies and working through resolution.
Performing impact/risk assessments.

Qualification

Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.

Vulnerability ScanningNetwork AnalysisSystem HardeningApplication AssessmentRisk AssessmentCybersecurity PrinciplesTroubleshootingRisk ManagementComputer NetworkingNetwork SecurityIntrusion DetectionIntrusion PreventionNetwork ProtocolsDirectory ServicesSystem AdministrationSecurity ClearanceCyber ThreatsVulnerabilitiesAccess Control MechanismsNetwork Traffic AnalysisVPN SecurityTransmission RecordsNetwork Access ManagementSystem Security ThreatsApplication Security ThreatsClasses of AttacksApplication Security Risks

Required

Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Skill in using DoD network analysis tools to identify vulnerabilities (e.g., ACAS, HBSS, etc.).
Skill in system, network, and OS hardening techniques (e.g., remove unnecessary services, password policies, network segmentation, enable logging, least privilege, etc.).
Skill in conducting application vulnerability assessments.
Ability to identify systemic security issues based on the analysis of vulnerability and configuration data.
Ability to share meaningful insights about the context of an organization’s threat environment that improve its risk management posture.
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Skill in troubleshooting and diagnosing cyber defense infrastructure anomalies and work through resolution.
Skill in performing impact/risk assessments.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth & concept of zero trust).
Knowledge of basic system, network, and OS hardening techniques.
Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications.
Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services.
Knowledge of application vulnerabilities.
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of system administration concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems.
Must currently hold a security clearance at the Secret level.
US Citizenship is a requirement for this contract.

Preferred

Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities list).
Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).
Knowledge of network traffic analysis methods.
Knowledge of Virtual Private Network (VPN) security.
Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML).
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code).
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
Knowledge of application security risks.
Other duties as assigned.

Company

UICGS / Bowhead Family of Companies

twittertwitter
company-logo
UIC Government Services (UICGS).

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Mike Hundley
Sr. Vice President of Operations, UIC Government Services
linkedin
Company data provided by crunchbase
logo

Orion

Your AI Copilot