Feb 27
Top Secret/SCI
Mid Level Career (5+ yrs experience)
$85,000
Occasional travel
IT - Security
San Antonio, TX (On/Off-Site)
Premier Technical services Corporation is seeking a Cyber Security Analyst in San Antonio,
TX. This position provides Tier II Cyber Security Analysis to C5ISR Center Defensive Cyber
Solutions Branch (DCSB) Defensive Cyber Operations (DCO). Beyond advising and guiding
technical matters, this position is tasked with driving implementation and adoption of new
tools, research, capabilities, frameworks, and methodologies while ensuring those already
in use are implemented, utilized properly, and improved. Schedule: Day/Night panama
schedule– primarily hiring for night shift with the possibility to rotate to days
Primary Responsibilities:
We are interested in individuals with experience using SIEMs/SIMs (ArcSight, Security Onion, Elastic Security, Splunk, etc.), reviewing alerts, conducting analysis on said alerts, and writing technical reports. Packet analysis is important as is experience with Linux command line as our infrastructure is Linux based. ACAS, HBSS, ISSO/ISSM experience are also not applicable to our role.
Identify and offer solutions to gaps in capabilities and visibility
Promote and drive research and implementation of automation and process efficiencies
Intermediate command line experience that includes chaining Linux utilities such as
tcpdump, sed, awk, and grep together
Intermediate IDS (Snort, Bro/Zeek, etc.) creation and tuning, to include performing impact
analysis on customer environments and review and correction of Tier I rules
Analysis of alert traffic plus surrounding traffic to provide context to inform analysis
Ability to consume open and closed source and search indicators in customer data, then
generate new IDS configurations for future detection
Basic hunt experience that includes sifting non-alert-based traffic and deriving meaningful
results in the absence of corresponding OSINT
Basic vulnerability awareness and able to determine applicability to customer
environments, using data to establish attack attempts and success/failure
Maintaining current threat awareness
Ability to analyze complex (multipacket, multi-vector, multi-exploit, large volume) traffic
and derive meaningful conclusions
Self-directed research, development, customization, or other contributions to process
improvement
Continual enrichment of IDS and moderate ability to tune on the fly
Ability to self-educate with non-comprehensive or incomplete documentation on new
concepts, protocols, and data formats
,Basic Qualifications:
Requires BS and 4+ years of prior relevant experience or Masters with 2+ years of prior
relevant experience, additional years of experience will be accepted in lieu of a
degree.
3+ years’ experience working in a SOC environment
Hands-on cybersecurity network defense experience (Detect and Respond) within a
Computer Incident Response organization. Hands-on experience with a Security
Information and Event Management tool (ArcSight, Security Onion, etc.)
Fluent in computer network Packet Capture (PCAP) analysis
DoD 8570 IAT-II and CSSP-Analyst certifications required prior to starting
Advanced knowledge of solution development techniques and best practices related to
demonstration, pilot, and test management and operations.
Demonstrated advanced knowledge of industry accepted standards.
Demonstrated experience with researching and fielding new and innovative technology.
Motivated self-starter with strong written and verbal communication skills, and the ability
to create complex technical reports on analytic finding.
Strong analytical and troubleshooting skills.
Must be a US Citizen
Candidate must possess an active TS/SCI and be approved customer SAP read-ons
Preferred Qualifications:
Deep technical understanding of core current cybersecurity technologies as well as
emerging capabilities.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack
vectors and methods of exploitation with an understanding of intrusion set tactics,
techniques and procedures (TTPs).
,Motivated self-starter with strong written and verbal communication skills, and the ability
to create complex technical reports on analytic findings.
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology,
and/or MITRE ATT&CK framework.
TX. This position provides Tier II Cyber Security Analysis to C5ISR Center Defensive Cyber
Solutions Branch (DCSB) Defensive Cyber Operations (DCO). Beyond advising and guiding
technical matters, this position is tasked with driving implementation and adoption of new
tools, research, capabilities, frameworks, and methodologies while ensuring those already
in use are implemented, utilized properly, and improved. Schedule: Day/Night panama
schedule– primarily hiring for night shift with the possibility to rotate to days
Primary Responsibilities:
We are interested in individuals with experience using SIEMs/SIMs (ArcSight, Security Onion, Elastic Security, Splunk, etc.), reviewing alerts, conducting analysis on said alerts, and writing technical reports. Packet analysis is important as is experience with Linux command line as our infrastructure is Linux based. ACAS, HBSS, ISSO/ISSM experience are also not applicable to our role.
Identify and offer solutions to gaps in capabilities and visibility
Promote and drive research and implementation of automation and process efficiencies
Intermediate command line experience that includes chaining Linux utilities such as
tcpdump, sed, awk, and grep together
Intermediate IDS (Snort, Bro/Zeek, etc.) creation and tuning, to include performing impact
analysis on customer environments and review and correction of Tier I rules
Analysis of alert traffic plus surrounding traffic to provide context to inform analysis
Ability to consume open and closed source and search indicators in customer data, then
generate new IDS configurations for future detection
Basic hunt experience that includes sifting non-alert-based traffic and deriving meaningful
results in the absence of corresponding OSINT
Basic vulnerability awareness and able to determine applicability to customer
environments, using data to establish attack attempts and success/failure
Maintaining current threat awareness
Ability to analyze complex (multipacket, multi-vector, multi-exploit, large volume) traffic
and derive meaningful conclusions
Self-directed research, development, customization, or other contributions to process
improvement
Continual enrichment of IDS and moderate ability to tune on the fly
Ability to self-educate with non-comprehensive or incomplete documentation on new
concepts, protocols, and data formats
,Basic Qualifications:
Requires BS and 4+ years of prior relevant experience or Masters with 2+ years of prior
relevant experience, additional years of experience will be accepted in lieu of a
degree.
3+ years’ experience working in a SOC environment
Hands-on cybersecurity network defense experience (Detect and Respond) within a
Computer Incident Response organization. Hands-on experience with a Security
Information and Event Management tool (ArcSight, Security Onion, etc.)
Fluent in computer network Packet Capture (PCAP) analysis
DoD 8570 IAT-II and CSSP-Analyst certifications required prior to starting
Advanced knowledge of solution development techniques and best practices related to
demonstration, pilot, and test management and operations.
Demonstrated advanced knowledge of industry accepted standards.
Demonstrated experience with researching and fielding new and innovative technology.
Motivated self-starter with strong written and verbal communication skills, and the ability
to create complex technical reports on analytic finding.
Strong analytical and troubleshooting skills.
Must be a US Citizen
Candidate must possess an active TS/SCI and be approved customer SAP read-ons
Preferred Qualifications:
Deep technical understanding of core current cybersecurity technologies as well as
emerging capabilities.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack
vectors and methods of exploitation with an understanding of intrusion set tactics,
techniques and procedures (TTPs).
,Motivated self-starter with strong written and verbal communication skills, and the ability
to create complex technical reports on analytic findings.
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology,
and/or MITRE ATT&CK framework.
group id: 10115149