Yesterday
Top Secret/SCI
IT - Security
Arlington, VA (On/Off-Site)
SOC Analyst
Candidate must have a TS/SCI security clearance.
Program Description: This Program is supporting a worldwide enterprise that is virtual and we are looking to optimize, modernize, and make it the most innovative network possible for our customer and their missions.
Day to Day Responsibilities:
Provide Network Security Service Operations Services
Provide provisioning and management for firewalls, Intrusion Detection/Prevention Systems and other security appliances
Coordinate across the enterprise to make sure network security devices are being monitored and receiving or generating alerts
Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
Configures, installs, maintains and upgrades server applications and hardware.
Evaluates, tests, recommends, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software.
Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
Working as expert, conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and open-source information.
Correlates threat data from various sources.
Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations.
Collects data using a combination of standard intelligence methods and business processes.
Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
Candidate must have a TS/SCI security clearance.
Program Description: This Program is supporting a worldwide enterprise that is virtual and we are looking to optimize, modernize, and make it the most innovative network possible for our customer and their missions.
Day to Day Responsibilities:
Provide Network Security Service Operations Services
Provide provisioning and management for firewalls, Intrusion Detection/Prevention Systems and other security appliances
Coordinate across the enterprise to make sure network security devices are being monitored and receiving or generating alerts
Manages the Information Technology (IT) infrastructure within an organization, including the physical network (e.g., LANs/WANs, servers, terminals) as well as server applications and software (e.g., PeopleSoft, Oracle).
Configures, installs, maintains and upgrades server applications and hardware.
Evaluates, tests, recommends, coordinates, monitors and maintains information systems (IS) and cyber security policies, procedures and systems, including access management for hardware, firmware and software.
Ensures that IS and cyber security plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS and cyber security.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
Develops techniques and procedures for conducting IS and cyber security risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
Working as expert, conducts research and evaluates technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks
Analyzes network events to determine the impact on current operations and conduct all-source research to determine advisory capability and intent.
Prepares assessments and cyber threat profiles of current events based on the sophisticated collection, research, and analysis of classified and open-source information.
Correlates threat data from various sources.
Develops and maintains analytical procedures to meet changing requirements and ensure maximum operations.
Collects data using a combination of standard intelligence methods and business processes.
Produces high-quality papers, presentations, recommendations, and findings for senior US government intelligence and network operations officials.
group id: 10313966