drjobs SOC Operations/Watch Floor Cybersecurity Analyst - Jr

SOC Operations/Watch Floor Cybersecurity Analyst - Jr

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Huntsville, AL - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Description

TMC Technologies is in search of a entry-level Cybersecurity Analyst to join the FBIs ESOC Watch Floor Operations Team playing a crucial role in the FBIs cybersecurity defense strategy. Operating around the clock 24/7 365 days a year this dynamic team ensures the timely detection and resolution of potential security incidents thereby minimizing the impact of cyber threats on the organization. The watch floor team is responsible for actively detecting monitoring preventing and analyzing real-time cybersecurity information events and threats. The candidate must be a US citizen and possess a minimum of an active Top Secret clearance with Sensitive Compartmented Information (SCI) eligibility to start due to federal contract requirements. This position is in support of a newly awarded contract and requires shift work.

The Watch Floor Cybersecurity Analyst - Jr will have the following responsibilities:

- Responsible for monitoring computer networks for security issues.
- Investigating security breaches and other cybersecurity incidents.
- Document security breaches and assess the damage they cause.
- Work with the security team to perform tests and uncover network vulnerabilities such as penetration testing.
- Fix detected vulnerabilities to maintain a high-security standard.
- Recommend best practices for IT security.
- Installing security measures and operating software to protect systems and information infrastructure including firewalls and data encryption programs.
- Must be capable of conducting analysis confirming intrusion information and creating a forensically sound duplicate of the files.
- Decrypts data and provides technical summaries and input.
- Examines recovered data for relevant information and performs dynamic analysis to include timeline statistical and file signature analysis.
- Performs real-time cyber defense handling tasks to support deployable Incident Response Teams (IRTs).

SHIFTS AVAILABLE:
Wed-Sat 6am-4pm



Requirements

- US Citizenship and active Top Secret clearance with SCI eligibility required
- Minimum of 1 year of relevant experience required
- Bachelors Degree required
- Experience with security information and event management (SIEM) systems preferred
- Splunk experience required

- Preferred certifications include:
GIAC Continuous Monitoring Certification (GMON)
GIAC Certified Incident Handler (GCIH)
GIAC Certified Forensic Analyst (GCFA)
GIAC Certified Intrusion Analyst (GCIA)
GIAC Network Forensic Analyst (GNFA)
Microsoft Sentinel




Required Experience:

Junior IC

Employment Type

Full-Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.