This job is closed

We regret to inform you that the job you were interested in has been closed. Although this specific position is no longer available, we encourage you to continue exploring other opportunities on our job board.

Telos - Grissom Air Force Base, IN

posted 2 days ago

Full-time - Mid Level
Grissom Air Force Base, IN
Professional, Scientific, and Technical Services

About the position

Telos is looking for an IT Security Analyst to provide Functional Mission Analysis-Cyber assistance to identify the United States Air Force weapon system's critical information technology architecture and supporting infrastructure that aids the warfighting mission. The Telos team supporting Functional Mission Analysis work activities shall possess a fundamental understanding of DoD Mission Assurance concepts and principles and how they relate to the United States Air Force (USAF) Mission. Team members shall be familiar with the purpose and use of the Mission Assurance Decision Support System (MADSS) and other similar data base repositories, such as the Strategic Mission Assurance Database System (SMADS). Together you and your teammates shall possess an in-depth knowledge of various technical resources pertinent to emerging cyber tools and capabilities required to perform functional mission analysis and supporting assessments, including open-source technologies.

Responsibilities

  • Investigate a diverse collection of network activities in cyberspace to determine essential MRT-C support designed for command, control, processes, and systems.
  • Develop a strategy to identify, evaluate, and minimize risks in the local cyberspace environment that are considered crucial for mission success.
  • Create and implement strategies and techniques to merge and display relevant MRT-C, based on essential systems and network services.
  • Identify and analyze trends to define MRT-C requirements and provide guidance and alignment services.
  • Assist with FMA-C, identifying, mapping, and developing a defense plan to safeguard MRT-C.
  • Maintain databases to monitor systems, modify user boundaries, and create indexing to make searches easier.
  • Utilize classified and unclassified networks and information portals to create support and information distribution plans for mission activities.
  • Review and provide recommendations for establishing new or revised policies, procedures, objectives, and organization design for the staff, as necessary.
  • Coordinate with local SMEs to resolve events and/or incidents.
  • Brief supporting recommendations and Courses of Actions.
  • Define and perform vulnerability assessments leveraging threat analysis to scope and prioritize efforts.
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts.
  • Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.
  • Perform cyber defense trend analysis and reporting.
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.

Requirements

  • Bachelor's degree in Computer Science, Information System Engineering, Business, or related technical discipline in cybersecurity or information technology.
  • Possess 5 years of combined experience in Functional Mission Analysis in Cyberspace processes and associated mapping and defense of Mission-Relevant Terrain in Cyberspace.
  • Experience in Information Technology (IT) cybersecurity principles, concepts, and methods to investigate, analyze, and respond to cyber incidents within a computer network environment or enclave.
  • Knowledge of IT security principles, policies, products and services to assess risk factors and advise on vulnerability to attack from a variety of sources.
  • Familiarity with commonly applied telecommunications principles, concepts, and methodologies, operating characteristics and capabilities of systems, media, equipment, and related software systems.

Nice-to-haves

  • IAT Level II Certification (ex: CompTIA Security+) in accordance with DOD 8140 and AFMAN 17-1303.
  • Possess and maintain a Top-Secret clearance with SCI eligibility for access to classified processing systems.
  • Ability to communicate effectively, both orally and in writing.

Benefits

  • Generous paid time off
  • Medical insurance
  • Dental insurance
  • Vision insurance
  • Tuition reimbursement
  • 401k
Job Description Matching

Match and compare your resume to any job description

Start Matching
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service