Security Analyst Tier II

  • Company:
    Federal Staffing Solutions Inc.
  • Location:
  • Salary:
    negotiable / month
  • Job type:
    Full-Time
  • Posted:
    12 hours ago
  • Category:
    IT Services

We connect our employees with some of the best opportunities around. Time and time again, our employees tell us that the most important thing we offer is respect. Federal Staffing Solutions puts people to work in all types of jobs. When you work with us, you build a relationship with a team of employment professionals in your community who have, in turn, built personal relationships with the businesses that are hiring. We are looking for a Security Analyst Level II to work in Ashburn,VA supporting our client. Location: Washington, DC. Clearance: US Citizen Salary up to: 104,000 Experience Requirements: Must have one of the following J3 Certifications: GCIH Incident Handler GCFA Forensic Analyst GCFE Forensic Examiner GREM Reverse Engineering Malware GISF Security Fundamentals GXPN Exploit Researcher and Advanced Penetration Tester GWEB Web Application Defender GNFA Network Forensic Analyst OSCP (Certified Professional) OSCE (Certified Expert) OSWP (Wireless Professional) OSEE (Exploitation Expert) CCFP Certified Cyber Forensics Professional CISSP Certified Information Systems Security CCNA Security CCNP Security CEH Certified Ethical Hacker CHFI Computer Hacking Forensic Investigator LPT Licensed Penetration Tester ECSA EC-Council Certified Security Analyst ENSA EC-Council Network Security Administrator ECIH EC-Council Certified Incident Handler ECSS EC-Council Certified Security Specialist ECES EC-Council Certified Encryption Specialist EnCE Windows Forensic Examinations FTK WFE-FTK CIRC Computer Incident Responders Course WFE Windows Forensic Examination CI Counter Intelligence FIWE Forensics and Intrusions in a Windows Environment Bachelors degree in Science or Engineering Field, IT, or Cybersecurity or related field 3+ years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics. Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell Desired Requirements: Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC role Cyber Kill Chain Knowledge Essential Requirements: US Citizenship is required. Our client is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected Veteran status, or disability status. Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation. While performing the duties of this job, the employee will regularly sit, walk, stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally, movement that requires twisting at the neck and/or trunk more than the average person, squatting/ stooping/kneeling, reaching above the head, and forward motion will be required. The employee will continuously be required to repeat the same hand, arm, or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close, distance, depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist, waist to shoulder, or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress. Clearance: US Citizen. Prefer Secret Clearance with the ability to obtain TS/SCI. Job Duties: Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data. Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response. Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response. Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes. Lead Incident Response activities and mentor junior staff. Work with key stakeholders to implement remediation plans in response to incidents. Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership. Equal Opportunity Employer