Participates in 24x7x365 monitoring of SIEM and other cybersecurity monitoring tools to detect and respond to cybersecurity threats within the enterprise network environment. Performs actions to protect monitor detect analyze and respond to unauthorized activity. Employs cybersecurity capabilities and deliberate actions to respond to specific alerts or emerging threats. Reviews logged events for trends that are indicative of attack or compromise within the environment. Actively monitors logs and traffic for Advanced Persistent Threats (APT) and low and slow attacks within the environment. Maintains awareness of possible threats with the use of intelligence resources which include Open-Source Intelligence (OSINT). Provides technical analysis and sustainment support for the enterprise for cybersecurity tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats.
Minimum Requirements:
- Five (5) years relevant experience
- Two (2) years performing root cause analysis of cybersecurity events and incidents.
- Working knowledge of at least two types of security tools: Firewall IDS/IPS host-based antivirus Data loss prevention Vulnerability Management Forensics Malware Analysis device hardening understanding of Defense-in-depth Ability to build scripts and tools to enhance threat detection and incident response capabilities (Preferably in SPL Python PowerShell)
- Must possess IT-I Critical Sensitive security clearance or Tier 5 (T5).
- Must have Baseline Certification for IAT-II and CNDSP/CSSP-IR when on-boarding and must have one of the Computer Network Defense CE Certifications within six (6) months of on-boarding.