Security Operations Analyst II

Location US-TX-Fort Worth
Posted Date 5 days ago(2/14/2018 11:57 AM)
Job ID
2018-5900
# Positions
1
Priority
High
SECURITY CLEARANCE
Secret

Overview

The Security Operations Analyst II represents a mid-level level position for a career in Information Assurance and Security at the ESA, LLC Fort Worth Operations Site.  The  position is under the direct supervision of the Chief Information Security Officer.

 

The Security Operations Analyst II is a member of the information security team and works closely with other members of the team to assist in the development and implementation of a comprehensive information security program.  This role is primarily responsible for operational security tasks such as vulnerability management, log monitoring and analysis, and incident response.

Responsibilities

Responsibilities & Tasks:

 

  • Analyze potential infrastructure security incidents to determine if incident qualifies as a legitimate security breach.
  • Perform network incident investigations, determining the cause of the security incident and preserving evidence for potential legal action.
  • Monitor and correlate security event log information to identify and detect anomalous activity.
  • Initiate escalation procedure to counteract potential threats/vulnerabilities.
  • Document and conform to processes related to security monitoring, patching and incident response.
  • Appropriately inform and advise management on incidents and incident prevention.
  • Maintain security by monitoring and ensuring compliance to standards, policies, and procedures; conducting incident response analyses; assisting with the development of training programs.
  • Participate in knowledge sharing with other analysts and develop solutions efficiently.
  • Perform enterprise security platform operation & maintenance.
  • Gather intelligence on, characterize, and track threat actors’ activities, ranging from tactical (targeted) level capabilities to global operations.
  • Correlate collected intelligence, in order to build upon a larger knowledge base of tracked threat activity.
  • Prepare system security reports by collecting, analyzing, and summarizing data and trends.

     

Qualifications

Minimum Qualifications:

 

Education (Highest Level Required/Preferred):

Bachelor degree required.

   

Training Pre-requisites (Within One Year of Taking Position):

 

      þ ESD

      þ Safety Training, as dictated by Safety Department

      þ Other: DoD 8570.01-M IAT Level II certification (see list below)

     

Certifications/Licenses: (DoD 8570.01 IAT Level II certification)

Preferred:       DoD 8570.01-M IAT Level II certification (i.e., CompTIA Security+, GSEC, SCNP or SSCP)

 

 

Experience Required:

Functional (Using Skill Set): 3-5 years

Management: 3-5 years

Industry: 3-5 years

 

Knowledge, Skills, Abilities Required (Unique and Measurable):

  • Bachelor’s degree in Computer Science or 3-5 years equivalent IT work experience.
  • Detailed understating of network defense practices
  • Detailed knowledge of National Institute of Standards and Technology (e.g. NIST SP 800-53 Rev. 4, NISP SP 800-171) compliance standards, controls and remediation technologies, solutions and processes.
  • Knowledge of system security design and defense-in-depth concepts
  • Ability to communicate technical security information to non-technical personnel
  • 3-5 years of Information Security experience
  • Knowledge of information security practices, principles, and tools
  • Ability to obtain a government clearance (US Citizenship is required)

 Desired Skills

  • Knowledge of common L4-L7 protocols such as SSL, HTTP, DNS, SMTP and IPsec
  • Knowledge of TCP/IP, computer networking, routing, switching and packet analysis tools
  • Strong understanding of Microsoft Windows endpoint (XP, 7, 8, 10) system administration capabilities.
  • Proficient understanding of Microsoft Windows Server (2003, 2008, 2012) system administration capabilities.
  • Experience using high-level programming languages (i.e., C++, Python, MS PowerShell) to automate system administration tasks.
  • Fundamental knowledge of industry standard information security tools (i.e., Wireshark, Kali Linux, TCP Dump, NMAP).

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed