Sign Up Sign Up Log In Sign Up
This job has expired and you can't apply for it anymore. Start a new search.

EUCOM Cyber Security Analyst

Job Description

Are you interested in continuing your career in Europe in a mission focused environment? CACI has established upcoming positions throughout the European theater supporting multiple customers for the Department of Defense. We are looking for experienced, innovative and motivated IT Specialists to support enablement of EUCOM’s mission objectives.

What You’ll Get to Do:

 CACI has an excellent opportunity for an experienced, self-directed, Cyber Security Analyst.  This position is in support of a Department of Defense (DoD) organization, US EUCOM located OCONUS in Stuttgart, Germany.  This position is required to travel OCONUS.  

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner. The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts.  The candidate must be experienced in interfacing with both client managers and system users.

The Cyber Security Analyst will provide technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint.  Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

Provide exceptional technical expertise to support the Combatant Command (CCMD) cybersecurity program and its functions IAW current architectures which includes all hardware and software tools and sensors from perimeter to endpoint.  Provides Information Security Controls and guidelines to nodes and network management systems. Maintains network/system access and password controls. Collates and analyzes audit trail data. Reviews security threats and determines/implements effective countermeasures IAW established policies/regulations/directives. Analyzes network or system changes/reconfigurations for security impacts (performs risk analysis/assessment). Test and evaluate software security patches and security related configuration changes for compatibility with the current baseline and resolve any conflicts prior to deployment. Monitor implemented security controls and report status. Perform periodic and on-demand scans for vulnerabilities and unauthorized software on all CCMD assets using provided tools and provide results for review. Maintain scanning results and develop vulnerability trend results. Compile information and support required cyber evaluations, inspections, assessments, and reporting tasks. Perform incident response actions including, but not limited to, system isolation, data gathering, evidence handling, and reporting. Develop recommendations for counter measures or process improvement based on lessons learned from security incidents. Audit logs and provide reports as required. Other duties as assigned.

More About the Role:

The successful candidate must be able to communicate clearly and succinctly both written and orally, and present products and ideas in a business-like manner.  The candidate will be required to work in dynamic fast paced environments that require team interaction and coordination of efforts.  The candidate must be experienced in interfacing with both client managers and system users.

Operate tools and systems that are required to support the Command's cybersecurity program. Support to Blue Coat, Splunk, CyberArk, and BitLocker. Conduct Enterprise Logging. Report potential cybersecurity incidents, perform incident actions, and report status. Support HBSS services.  Provide STIG Assessment. Support ACAS Scanning. Support command security assessments.

Assist in the enhancement of EUCOM's Cyber Threat Capability.

Provide focused operations/threat analysis on known intrusion sets. Discovering, tracking, reporting, and fusing global network events of interest. Apply subject matter expertise in adversarial methodologies in the cyber domain, and participate in OPTs. Develop and deliver specific deliverables associated with this support that are identified by the Government to include but not limited to Weekly Reports, Cyber Tippers, Briefings, Network Analytical Reports, ad hoc, and SPOT reports.

Additionally, the Cyber Security Analyst will provide remote support and/or travel to customer sites as required.


You’ll Bring These Qualifications:

  • Currently hold an adjudicated Top Secret/SCI Clearance and be able to maintain
  • BA/BS + 3 years recent specialized or AA/AS +5 years recent specialized or a major cert +7 years recent specialized or years of recent specialized experience
  • DOD 8570 IAM II compliance
  • CEH, CRISC, GSEC

  • Working knowledge of supporting Operating Systems: Windows Server 2008-2016 and Windows 10, VMWare vSphere, Solaris 10-11, Red Hat Enterprise Linux
  • Demonstrate expert knowledge in network access control, intrusion prevention and detection systems, firewalls, routers, incident response, information security methods, and risk management
  • In-depth experience with DoD IT security requirements
  • TESA eligibility

These Qualifications Would be Nice to Have:

  • ITIL v3 – Foundation
  • Experience with Bluecoat, McAfee HBSS, Splunk, CyberArk and Bitlocker, ACAS
  • Automation using Microsoft PowerShell, VBScript, or batch files
  • Adaptable to changing circumstances and operational needs
  • Understanding of Department of Defense Military standards

CITS III


What We Can Offer You:

  • We’ve been named a Best Place to Work by the Washington Post.
  • Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
  • We offer competitive benefits and learning and development opportunities.
  • We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
  • For over 55 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.

Job Location

DE-International--GERMANY


 

CACI employs a diverse range of talent to create an environment that fuels innovation and fosters continuous improvement and success. At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers. CACI is proud to provide dynamic careers for employees worldwide. CACI is an Equal Opportunity Employer - Females/Minorities/Protected Veterans/Individuals with Disabilities.

Company Name:
Security Clearance:
Top Secret / SCI
Location:
International
Country:
Germany
Salary:
Not Specified
Job Number:




Send me email alerts for similar jobs

JOIN US