Command Post Technologies - Norfolk, VA
posted 4 months ago
Command Post Technologies, Inc. (CPT) has an opening for a Cyber Security Network Defense (CND) Analyst. The selected candidate will conduct real-time monitoring, analysis, mitigation, and defense of enterprise systems and network operations. This role involves conducting intrusion analysis, incident response, vulnerability assessment, external assessment, and cyber threat analysis to defend the organization. The candidate will also assist in developing policies and standards related to the use of computing resources, overall strategy, design, implementation, and operational aspects of multiple systems. A strong emphasis is placed on creating, revising, and reviewing technical writing documentation, ensuring clarity and precision in all communications. The responsibilities include supporting real-time monitoring of all assigned IPS/IPS deployed and supporting the mission, monitoring network traffic to provide event correlations of operational traffic from multiple locations to determine network security posture, and using standard/provided network tools to evaluate traffic for incident response analysis. The candidate will create and maintain reports for various security systems such as ACAS, HBSS, STIG Compliance Viewer, and JSA, and maintain IDS/IPS/NAC devices. Additionally, the role requires performing IDS/IPS/NAC Real-Time Monitoring Analysis, Network Event Correlation/Advanced Traffic Analysis, Incident Response & Analysis, and Vulnerability Analysis. The candidate will also conduct Network Defense Training and support Standardization & Evaluation (Stan/Eval) activities, providing Systems Planning support and preparing Network Defense Technical Reports. The selected candidate will be expected to prepare and present oral and written technical communications, including technical reports, meeting minutes, program plans, concepts of operations, contingency plans, and related documentation as identified for task deliverables. The role is critical in ensuring the security and integrity of the organization's network and systems, requiring a proactive approach to identifying and mitigating potential threats.