Command Post Technologies - Norfolk, VA

posted 4 months ago

Full-time - Mid Level
Norfolk, VA
Educational Services

About the position

Command Post Technologies, Inc. (CPT) has an opening for a Cyber Security Network Defense (CND) Analyst. The selected candidate will conduct real-time monitoring, analysis, mitigation, and defense of enterprise systems and network operations. This role involves conducting intrusion analysis, incident response, vulnerability assessment, external assessment, and cyber threat analysis to defend the organization. The candidate will also assist in developing policies and standards related to the use of computing resources, overall strategy, design, implementation, and operational aspects of multiple systems. A strong emphasis is placed on creating, revising, and reviewing technical writing documentation, ensuring clarity and precision in all communications. The responsibilities include supporting real-time monitoring of all assigned IPS/IPS deployed and supporting the mission, monitoring network traffic to provide event correlations of operational traffic from multiple locations to determine network security posture, and using standard/provided network tools to evaluate traffic for incident response analysis. The candidate will create and maintain reports for various security systems such as ACAS, HBSS, STIG Compliance Viewer, and JSA, and maintain IDS/IPS/NAC devices. Additionally, the role requires performing IDS/IPS/NAC Real-Time Monitoring Analysis, Network Event Correlation/Advanced Traffic Analysis, Incident Response & Analysis, and Vulnerability Analysis. The candidate will also conduct Network Defense Training and support Standardization & Evaluation (Stan/Eval) activities, providing Systems Planning support and preparing Network Defense Technical Reports. The selected candidate will be expected to prepare and present oral and written technical communications, including technical reports, meeting minutes, program plans, concepts of operations, contingency plans, and related documentation as identified for task deliverables. The role is critical in ensuring the security and integrity of the organization's network and systems, requiring a proactive approach to identifying and mitigating potential threats.

Responsibilities

  • Support real-time monitoring of all assigned IPS/IPS deployed and supporting the mission.
  • Monitor network traffic to provide event correlations of operational traffic from multiple locations to determine network security posture.
  • Use standard/provided network tools to evaluate traffic for incident response analysis.
  • Create and maintain reports for various security systems such as ACAS, HBSS, STIG Compliance Viewer, and JSA.
  • Maintain IDS/IPS/NAC devices.
  • Perform IDS/IPS/NAC Real-Time Monitoring Analysis.
  • Perform Network Event Correlation/Advanced Traffic Analysis.
  • Perform Incident Response & Analysis.
  • Perform Vulnerability Analysis.
  • Perform IDS/IPS Sensor testing, installation, configuration, and maintenance.
  • Provide IDS/IPS Database & VPN Technical Support.
  • Conduct Network Defense Training.
  • Support Standardization & Evaluation (Stan/Eval) activities.
  • Perform Operational Process Tracking and Processing.
  • Provide Systems Planning support.
  • Research, test, implement and train to disaster recovery plans.
  • Prepare Network Defense Technical Reports.
  • Prepare and present oral and written technical communications.
  • Provide technical reports, meeting minutes, program plans, concepts of operations, contingency plans, and related documentation as identified for task deliverables.
  • Prepare and disseminate operational reports.

Requirements

  • Active DoD Top Secret Security Clearance / SCI eligible
  • 5 or more years' relevant IT Security experience; OR 7 or more years' relevant IT experience.
  • IAT Level II Security Certification (e.g. Security + CE, GSEC, SSCP, CCNA-Security)
  • 3 years minimum of Traffic and Log Analysis experience
  • Extensive knowledge of network firewalls, computer, and server log analysis.
  • Extensive knowledge of digital evidence collection, handling, and security.
  • Experience with computer incident response and analysis and report dissemination.
  • Extensive knowledge and experience with network packet capture and analysis software such as WireShark (Ethereal) and Snort.
  • Experience with standard DoD network topology and DMZ boundary protection.
  • Experience with DoD/AF incident reporting processes.
  • Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.

Nice-to-haves

  • HBSS Experience
  • ACAS Experience
  • Linux Experience
  • ISE Experience
  • Scripting experience with PowerShell or related languages
  • Certified Ethical Hacker (CEH) certification
  • Current knowledge of USCYBERCOM CNDSP policies and procedures

Benefits

  • Flexible schedule
  • Leadership training provided
  • Parental leave
  • Tuition reimbursement
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service