Senior Information Security Analyst
Linthicum, MD
Applications have closed
XOR Security is currently seeking a talented Information Assurance Analyst to support one of our premier clients within the Department of Defense for the Defense Cyber Crimes Center (DC3). The DC3 program provides comprehensive Forensic, Malware Analysis and Reverse Engineering support across the Defense enterprise by providing deep analysis of potential threat activity targeting the critical DOD assets. To support this vital mission, XOR staff is on the forefront of providing full spectrum Media Analysis, and Systems Engineering support to include the development of advanced tools and analysis techniques to protect critical DoD assets from hostile adversaries. The Information Assurance Manager will be responsible for preparing documentation such as Risk Assessment Reports (RARs) for the ISSM/CISO, System Security Plans (SSPs), Development of Plan of Action & Milestones (POA&Ms) to ensure compliance with Government and DC3 Cybersecurity policies and procedures. Will assist the ISSM/ISSO with the generation of cybersecurity documentation for system hardware and software assessments; assess the performance of IA Security controls for assess and authorize and assess only networks.
Preferred Skills:
- Participates as a team member performing processing, triage, threat analyses, and response to cyber incident reports. based on knowledge on electronic warfare/intelligence systems and concept supporting intelligence analysis requirements for all-source cyber analysis and reporting.
- Contributes to development of analytical threat models and provides functional guidance and direction to threat studies team in overall conduct of project(s).
- Performs queries, pivoting on indicators, and on characteristics (Message-Digest Algorithm 5 (MD5), Secure Hash Algorithm 1 (SHA1), file size, file name, file paths, etc.). Work activities are performed under general guideline and direction.
- Supports team performing expert-level research and incident analysis and related data support of threat studies.
- Provides advice, guidance and direction to threat studies team.
- Prepares, submits and presents reports and issue papers to customer representatives.
- Requires knowledge of advanced threat analysis technology in such areas as telecommunications, computer science, electronic warfare.
- Requires a detailed knowledge of Department of Defense and service level (Army, Navy, Air Force) intelligence communities, including collection methods and production resources and responsibilities.
- Requires skills and abilities in supervising the handling classified information.
- Requires strong knowledge of technology related to electronic warfare.
- Uses Jira to track analysis tasks and communicate status. Uses Jira to manage cyber incident submissions. May use Columbo, the DAD, and Splunk to triage, augment, share cyber threat data.
- Uses Goldrush as required in place of Jira.
- Maintains and enhances Jira workflows, models, and dashboards to support cyber incident management activities including development of response timeline metrics, alerting, and escalation.
Closing Statement:
XOR Security offers a very competitive benefits package including health insurance coverage from first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.
XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.
Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements - TOP SECRET CLEARANCE REQUIRED.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Clearance Clearance Required Compliance Computer Science DoD Jira Malware Reverse engineering Risk assessment Risk Assessment Report Splunk System Security Plan Top Secret Top Secret Clearance
Perks/benefits: 401(k) matching Health care
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Product Security Engineer jobs
- Open Senior Information Security Analyst jobs
- Open Cyber Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Cybersecurity Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Chief Information Security Officer jobs
- Open Cybersecurity Consultant jobs
- Open IT Security Analyst jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open Cybersecurity Specialist jobs
- Open Sr. Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open Security Clearance-related jobs
- Open IDS-related jobs
- Open EDR-related jobs
- Open CEH-related jobs
- Open Forensics-related jobs
- Open Kubernetes-related jobs