Defensive Cyber Operations Analyst
Ogden, UT
Full Time Mid-level / Intermediate Clearance required USD 50K - 93K *
Dark Wolf Solutions
The Alphaof technology Dark Wolf Solutions operates at the nexus of mission and technology to meet our Nation's most challenging missions. JOIN THE PACK Connect Our Background About Us We combine the most innovative emerging technologies with...Dark Wolf Solutions is looking for a Defensive Cyber Operations Analyst who will perform continuous system monitoring to identify malicious cyber-attacks while supporting the containment, and remediation of IT threats. Additionally, this position will monitor networks and applications to identify a possible cyber-attack or intrusion and help coordinate and report on the cyber incident responses.
Key Responsibilities:
- Vulnerability Management actions to include providing recommendations. Implement mitigations.
- Active monitoring of Defensive Cyber Operations (DCO) systems
- Conduct intrusion analysis and correlation of unauthorized activities; provide and implement recommendations to improve customer mitigation processes
- Perform threat insight processes to provide analysis to support mitigation and remediation activities
- Analyze cyber incidents, correlate incident details, and formulate and implement response actions with guidance from leadership
- Participate in Root Cause Analysis process and documentation capturing efforts taken to mitigate unauthorized actions
- Participate in the development of DCO tactics, techniques, and procedures
- Participate in the development of DCO concept of operations, processes, and procedures
- Identify security discrepancies and report and respond to security incidents
- Provide research and analysis in support of expanding programs and areas of responsibility
- Draft documentation for briefings, reports, and informational analyses
- Assist in the development of local Tactics, Techniques, and Procedures (TTPs)
- Participate in customer exercises (after duty hours may be required)
- Adhere to defined policies, master plans and schedules
- Complete all initial and annual training requirements and disclosures as outlined by BSTG
- Perform all other duties as required, consistent with the goals, objectives, and responsibilities of the department
Required Qualifications:
- 4+ years of relevant experience
- 2+ years of experience with a SIEM Tool (LogRhythm, Splunk)
- 2+ years of experience with employment of DoD cybersecurity requirements, policies, and procedures to include assessment and authorization activities
- Experience within a vSOC, SOC, or CSSP responding to cyber incidents
- Department of Defense Directive (DoDD) 8140 (formerly DoDD 8570) IAT CSSP Certification must be obtained prior to hire (CEH, CCNA Security, GCIH, CySA+ or Equivalent)
- Bachelor’s degree in Computer Science, Information Technology, or a related field
- US Citizenship and an active Top Secret/SCI security clearance required
Desired Qualifications:
- Experience performing cybersecurity activities in support of software and system requirements, design, development, testing, and sustainment
- Experience with HBSS, ACAS, SCAP Compliance Checker (SCC), DISA STIGs
- Working knowledge of NIST 800-53 Security and Privacy Controls
- Experience with RHEL
- Experience in performing post-incident computer forensics without destruction of critical data
- Ability to provide guidance on DoD Cyber regulations and requirements to engineering and software development staff
We are proud to be an EEO/AA employer Minorities/Women/Veterans/Disabled and other protected categories.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: ACAS CEH Clearance Clearance Required Compliance Computer Science DCO DISA DoD DoDD 8140 DoDD 8570 Forensics GCIH LogRhythm Monitoring NIST NIST 800-53 Privacy SCAP Security Clearance SIEM SOC Splunk STIGs Top Secret TS/SCI TTPs Vulnerability management
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Senior Cyber Security Engineer jobs
- Open Principal Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Architect jobs
- Open Cyber Security Specialist jobs
- Open Product Security Engineer jobs
- Open Cybersecurity Analyst jobs
- Open Staff Security Engineer jobs
- Open Chief Information Security Officer jobs
- Open Senior Information Security Analyst jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Senior Penetration Tester jobs
- Open Consultant SOC / CERT H/F jobs
- Open Security Specialist jobs
- Open Senior Information Security Engineer jobs
- Open Sr. Security Engineer jobs
- Open Security Researcher jobs
- Open IT Security Engineer jobs
- Open Cybersecurity Specialist jobs
- Open Senior Security Architect jobs
- Open Windows-related jobs
- Open CISM-related jobs
- Open Network security-related jobs
- Open Pentesting-related jobs
- Open ISO 27001-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open SaaS-related jobs
- Open APIs-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open Java-related jobs
- Open Forensics-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs