Position Type: Full-time Location Type: Onsite Clearance Required: Active TS w/ SCI eligibility
Waypoint’s client is seeking a Cyber Security (Incident Response) Analyst to support a government Cyber Security Operation Center (CSOC) will conduct security event monitoring, advanced analytics, and response activities in support of the CND operational mission with diverse backgrounds in cyber security systems operations, analysis and incident response.
Responsibilities:
Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity, host activity, and data. This includes but is not limited to: network flow (i.e. Netflow) or related forms of session summary data, signature-based IDS/IPS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types).
Triage IDS/IPS alerts, collect related data from various systems, review open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.
Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
Develop IDS/IPS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
Develop security metrics and trend analysis reports.
Requirements:
Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience (additional relevant work experience can be substituted for a degree)
Must have a current DoD 8570.1-M IAT Level II certification.
Experience with deploying and writing signatures (Snort, YARA, HIPS)
Experience with network hunting utilizing Zeek/Bro
Experience with McAfee ePO, HBSS
Splunk: Create log searches, dashboards, setting up alerts, and scheduled reports to help detect and remediate security concerns.
Experience with ArcSight
Experience with Wireshark and packet analysis
Experience with Tanium or other endpoint solutions
Working knowledge of scripting languages such as Python, PowerShell, Shell
Knowledge of Regular Expressions
Knowledge of server and client operating systems
Participate in development and reporting of security metrics
Experience in a SOC or Incident Response role
Education Required
Salary Range
Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree.
$139-148K
*Waypoint Human Capital is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender, national origin, age, protected veteran status, or disability status.