Real Time Cyber Analyst

| Ford, Leinster, IRL
Employer Provided Salary: 85,000-105,000 Annually
Salary data is provided by the employer. Please note this is not a guarantee of compensation.
Sorry, this job was removed at 9:52 a.m. (CST) on Tuesday, June 4, 2024
Find out who's hiring in Other US Location.
See all Data + Analytics jobs in Other US Location
Apply
By clicking Apply Now you agree to share your profile information with the hiring company.

Who We Are…

Today’s leading government agencies and commercial organizations are putting their trust in Newberry Group, and for good reason.

Newberry brings strength to our clients, from the inside out through:

  • Client intimacy and superior quality;
  • Presence and accountability in our relationships; and,
  • Cross-sector leverage of public and commercial sector best practices.

The strength of our company is a direct reflection of our highly skilled and talented workforce.

Newberry Group is a nationwide IT company providing program and management consulting, in addition to commercial IT managed services and support. 

Job Summary

Newberry Group's Public Sector Division is seeking Real Time Cyber Analysts with the expertise to support a 24/7 Cyber Network Defense (CND) Operation for Department of Defense networks in Ford Island, Hawaii. This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Candidates must hold an active-Secret, or interim-Secret clearance. Additionally, candidates must have the ability to obtain an interim-Top Secret clearance and able to possess a Top-Secret w/ SCI clearance in the future.
Location
Ford Island, HI

Currently, the customer is operating on a hybrid schedule with split days in office and remote; the hybrid schedule is as mission allows and is subject to change. There are three available shifts: 7am-3pm, 3pm-11pm, and 11pm-7am. 
Salary
$85,000 to $105,000

Responsibilities and Duties

  • Review DoD and open source intelligence for threats.
  • Identify Indicators of Compromise (IOCs) and integrate those into sensors and SIEMs.
  • Triage alerts to identify malicious actors on customer networks.
  • Assist T1 analysts with triage and analysis.
  • Complete moderate-level cyber analysis of potential events.
  • Report incidents to customers and USCYBERCOM.

Basic Qualifications and Skills Required

  • Bachelor's degree and 2+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
  • Demonstrated understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
  • Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings
  • DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting.
  • DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification is required within 180 days of hire.
  • Demonstrated commitment to training, self-study and maintaining proficiency in the technical cyber security domain and an ability to think and work independently.
  • Strong analytical, troubleshooting, and critical thinking skills.
  • Willing to perform non-rotating shift work.
  • Must be a US Citizen.

Preferred Qualifications and Skills

  • CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.
  • Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
  • Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
  • Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations.
  • In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).
  • Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.
  • Experience with malware analysis concepts and methods.
  • Unix/Linux command line experience.
  • Scripting and programming experience.
  • Familiarity or experience in Intelligence Driven Defense and/or Cyber Kill Chain methodology.
  • Existing 8570 CSSP Analyst Certifications (CEH), CySA+ etc.or the ability to obtain within the customer's timeframe.

Benefits and Perks

In addition to competitive wages, Newberry Group offers an outstanding benefits package. This includes medical coverage with two plan options (HDHP or PPO), dental and vision coverage, personal time off, paid holidays, parental leave program, telecommuting if available, retirement savings accounts (Pre Tax and Roth), flexible and dependent care savings accounts, life insurance, long and short-term disability coverage, tuition and training reimbursement, and employee assistance program.

The Newberry Group, Inc. is an Equal Opportunity Employer – EEO/AA/Disability/Veterans.

More Information on Newberry Group
Newberry Group operates in the Consulting industry. The company is located in Columbia, Maryland . Newberry Group was founded in 1996. It has 94 total employees. To see all 1 open jobs at Newberry Group, click here.
Read Full Job Description
Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.

Similar Jobs

Apply Now
By clicking Apply Now you agree to share your profile information with the hiring company.
Learn more about Newberry GroupFind similar jobs