Sr Cybersecurity (CND) Analyst

Reston, VA

GuidePoint Security LLC

View company page

GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk. By taking a three-tiered, holistic approach for evaluating security posture and ecosystems, GuidePoint enables some of the nation’s top organizations, such as Fortune 500 companies and U.S. government agencies, to identify threats, optimize resources and integrate best-fit solutions that mitigate risk.

Candidates MUST have an active Top Secret/SCI clearance for consideration (CI Poly is preferred).

This position is not remote. There are multiple office locations available for work in the DC Metro area.

Job Details:

  • Performs forensic analysis of digital information and gathers and handles evidence
  • Monitor systems and networks for intrusions and proactively identify security flaws and vulnerabilities, and then develop plans of action to remediate security issues
  • Performs data analysis and evidence collection and assess and mitigate threats, both past present and future
  • May use programming skills to help reverse engineer malicious code and help create fixes for vulnerable applications or services on the network
  • Perform security audits, risk analysis, network forensics and penetration testing in order to analyze, develop, and recommend courses of action
  • Responsible for the full lifecycle of security incidents involving enterprise systems and data including personally identifiable information (PII) breaches
  • Manage and respond to computer security incidents through detection, investigation, analysis, remediation, and reporting of cybersecurity incidents in a timely manner with high quality
  • Help improve the overall security posture through obtaining the knowledge of the enterprise systems, and to ensure the timely dissemination of security information to the appropriate stakeholders
  • Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, IDS logs) to identify possible threats to network security
  • Respond to cyber incidents, including responding to IR phone calls and emails, and preparing situational awareness reports and escalate incidents as needed
  • Investigate phishing and other user self-identified potential cyber threats
  • Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation
  • Correlate incident data to identify specific vulnerabilities and make recommendations
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies through monitoring of vulnerability scanning devices
  • Identifies network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents
  • Conduct cyber trend analysis as well as malware analysis
  • Identify and analyze anomalies in network traffic using metadata
  • Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise
  • Track incidents thoroughly and communicate with end users and management effectively
  • Participate regularly in working group sessions, to include idea generation for new content rules for security alerting and reduction of false positives
  • Evaluate the current Computer Security Incident Response Capability (CSIRC) to ensure compliance with federal mandates for incident response and reporting
  • Maintain CSIRC specific Standard Operation Procedures and Incident Response Plans

Requirements:

  • Bachelor's degree from an accredited institute in an area applicable to the position; an additional 4 years of may be substituted in lieu of a degree
  • Minimum six (6) years of relevant experience in addition to education level
  • Must possess current DoD 8570 IAT II or IAM II certification (Security+ CE or greater)
  • Experience working in a DoD or IC environment desired
  • Current active TS/SCI clearance, with the ability to obtain and maintain a CI polygraph

Why GuidePoint?

GuidePoint Security is a rapidly growing, profitable, privately-held value added reseller that focuses exclusively on Information Security. Since its inception in 2011, GuidePoint has grown to over 700 employees, established strategic partnerships with leading security vendors, and serves as a trusted advisor to more than 3,000 Enterprise-Level customers.

Firmly-defined core values drive all aspects of the business, which have been paramount to the company’s success and establishment of an enjoyable workplace atmosphere. At GuidePoint, your colleagues are knowledgeable, skilled, and experienced and will seek to collaborate and provide mentorship and guidance at every opportunity.  

This is a unique and rare opportunity to grow your career along with one of the fastest growing companies in the nation.

Some added perks….

  • Remote workforce primarily (U.S. based only, some travel may be required for certain positions, working on-site may be required for Federal positions)
  • 100% employer-paid medical and dental premiums with generous employer family contributions
  • 11 corporate holidays in 2022 (12 in 2023) and a Flexible Time Off (FTO) program
  • Healthy mobile phone and home internet allowance
  • Eligibility for retirement plan after 2 months at open enrollment
  • Pet Care plan

 

Tags: Audits Clearance Compliance Cyber defense DoD DoDD 8570 Firewalls Forensics IAM IDS Incident response Log files Malware Monitoring Network security Pentesting Polygraph Risk analysis Top Secret TS/SCI Vulnerabilities

Perks/benefits: Flex hours Flex vacation

Region: North America
Country: United States
Job stats:  1  0  0
Category: Analyst Jobs

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.