Key Role:
Analyze a variety of information and intelligence relevant to the threats facing the systems, assets, and resources critical to the nation and develop relevant research studies and recommendations. Lead or participate in approved studies. Provide additional analysis in response to specific threats and incident reports, as needed. Manage program and project implementation and make significant contributions to department goals and planning efforts.
Basic Qualifications:
-3+ years of experience with analytic report writing
-2+ years of experience with user activity monitoring or data loss prevention tools
-Experience with statistical analysis
-Experience with Microsoft Office Suite
-Ability to multi-task and make decisions based on various contextual data sets
-Ability to obtain a security clearance
-BA or BS degree
Additional Qualifications:
-Experience with counterintelligence, risk assessment, information assurance, security, and network engineering
-Experience with conducting log analysis
-Experience with using Splunk
-Experience with the Linux command line
-Experience with working in a network security incident response team, including a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC), or Cybersecurity Incident Response Center (CSIRC)
-Network+, Security+, or Certified Information Security Professional (CISSP) Certifications
Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.
We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.
ESG1