Adapt Forward - Pearl City, HI

posted 10 days ago

Full-time - Entry Level
Pearl City, HI
Professional, Scientific, and Technical Services

About the position

The Operations Watch Analyst role involves isolating, investigating, informing, and implementing measures to detect and protect data across various sources and locations. The analyst is responsible for validating suspicious events, determining incident severity, and ensuring compliance with reporting requirements as outlined in the CJCSM 6510.01B. This position requires 24/7 support for incident response and involves network intrusion detection, digital forensics, and collaboration with various entities to ensure timely and accurate incident reporting.

Responsibilities

  • Maintain familiarity with CJCSM 6510.01B.
  • Compile and maintain internal standard operating procedure (SOP) documentation.
  • Ensure compliance of documentation and capabilities with CJCSM 6510.01B and other policy directives.
  • Provide network intrusion detection and monitoring, correlation analysis, incident response, and support for the Cybersecurity Service Provider (CSSP).
  • Validate suspicious events or reports and determine if they constitute an incident, entering data into reporting systems.
  • Coordinate with JFHQ-DoDIN and supported entities regarding significant incidents for proper analysis and reporting.
  • Provide 24x7 support for the CSSP's Incident Response capability during non-core business hours as needed.
  • Perform network and host-based digital forensics on various operating systems to support investigations into significant network incidents.
  • Conduct full packet capture (PCAP) analysis using tools like Wireshark.
  • Explore patterns in network and system activity via log correlation using Splunk and other tools.
  • Understand IDS/IPS solutions, including signature development and implementation.
  • Participate in program reviews, product evaluations, and onsite certification evaluations.
  • Work overtime as needed to support incident response actions.

Requirements

  • US Citizen
  • Bachelor's degree in a relevant discipline or at least three years of directly relevant experience, preferably in a DoD environment.
  • IATII and CSSP Compliant Certifications.

Nice-to-haves

  • Knowledge of Incident Response Procedures
  • Knowledge of Packet Analysis
  • Knowledge of IDS/IPS solutions
  • Familiarity with various Host-Based Tools
  • Experience with Log Aggregation Tools
  • Logical thinking and analytical ability
  • Verbal and written communication ability
  • Experience with Digital Forensics
  • Ability to solve problems independently.

Benefits

  • Comprehensive Physical Wellness Package including Medical, Dental, Vision Care, and Flexible Spending Accounts.
  • 401k Retirement Plan with Matching Contribution.
  • Annual Training Budget for conference attendance, school enrollment, certification programs, and travel expenses.
  • Eleven Federal Holidays and three weeks of PTO/vacation/sick leave that accrues at ten hours per month.
  • Employee Assistance Program offering counseling/legal assistance and other well-being programs.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service