Aktiviere Job-Benachrichtigungen per E-Mail!

Cyber Incident Handling Analyst / Active DoD Top Secret/SCI

Peraton

Erbenheim

Vor Ort

EUR 55.000 - 75.000

Vollzeit

Vor 17 Tagen

Erstelle in nur wenigen Minuten einen maßgeschneiderten Lebenslauf

Überzeuge Recruiter und verdiene mehr Geld. Mehr erfahren

Starte ganz am Anfang oder importiere einen vorhandenen Lebenslauf

Zusammenfassung

A leading company is seeking a Cyber Incident Handling Analyst to join their team supporting the U.S. Army in Wiesbaden, Germany. The role involves monitoring, analyzing cyber incidents, and coordinating with security tools to optimize defenses against threats. Candidates must have relevant qualifications, experience, and active security clearance. This position offers the chance to work on significant projects and make a real impact in cybersecurity.

Qualifikationen

  • Minimum of 2 years in Cyber Systems Engineering or equivalent experience.
  • Active DoD Top Secret/SCI security clearance required.
  • Fluency in government/corporate communications media.

Aufgaben

  • Monitor and analyze cyber events and incidents.
  • Manage incident response and threat analysis.
  • Coordinate security toolsets for effective cyber defense.

Kenntnisse

Fluency in MS Office
Network packet analysis
SIEM familiarity
Cyber defense knowledge
Scripting languages (Python, PowerShell)

Ausbildung

Bachelor’s degree in a STEM field or Business Administration
DoD Approved 8140 Certifications

Tools

Elastic SIEM
Splunk
Intrusion detection systems (Snort, Suricata, Zeek)

Jobbeschreibung

Minimum Qualifications:

  • Minimum of 2 years experience in Cyber Systems Engineering with a Bachelor’s degree in a STEM field or Business Administration; an additional 6 years of experience in lieu of degree may be considered.
  • Must be able to qualify for technical expert status accreditation (TESA) by having a bachelor's degree in a STEM field or Business Administration plus 3 years of specialized experience OR an associate’s degree plus 7 years of specialized experience OR a major certification plus 7 years of specialized experience.
  • Active DoD Approved 8140 Certification (DCWF:531 - B.S. or GCFA or GCIA), (DCWF: 511 - B.S. or GCFA, GCIA, CFR, Cloud+, CYSA+, GCED, PenTest) and (8140 Residential within 90 days of acceptance - Cisco CyberOps Professional, GCED, GCFA, GCFE, GCIH, GNFA, DCITA CIRC, Blue Team level 1, FIWE or Offensive Security OSDA).
  • Fluent in all aspects of government and corporate communications media to include all MS Office products and common task ticketing systems.
  • U.S. citizenship required.
  • An Active DoD Top Secret/SCI security clearance.

Preferred Qualifications:

  • Experience with the Elastic SIEM.
  • Experience in packet captures and analyzing a network packet.
  • Experience with intrusion detection systems such as Snort, Suricata, and Zeek.
  • Experience with SIEM systems such as Splunk, ArcSight, or Elastic.
  • Experience with Microsoft Windows event IDs.
  • Experience with Linux audit log analysis.
  • Familiarity with Git and VScode.
  • Strong understanding of adversary tactics, techniques, and procedures (TTPs) and the MITRE ATT&CK framework.
  • Experience with one or more scripting languages such as PowerShell, Bash, Python.

Peraton is currently seeking an experienced Cyber Incident Handling Analyst to join our team in support of the U.S. Army Europe Regional Cyber Center (RCC-E).

Location: Wiesbaden, Germany.

Role & Responsibilities:

Under general supervision, you will monitor, analyze, and detect cyber events and incidents in information systems and networks. This role supports integrated cyber defense efforts by coordinating security toolsets to sustain continuous monitoring and ongoing authorization programs.

You will:

  • Monitor, analyze, and act on SIEM alerts and events to detect malicious activities across information systems and networks.
  • Support dynamic cyber defense operations by coordinating security toolsets and adhering to the Department of Defense framework for measuring and quantifying cyber risk.
  • Conduct threat and vulnerability analysis by evaluating network and host activity against baseline requirements, researching security standards, reviewing vulnerability findings related to SIEM alerts, and analyzing system logs for indicators of malicious intent.
  • Manage incident response by documenting and classifying incidents (in accordance with Army and DoD regulations), determining root causes, coordinating remediation efforts, and performing post-intrusion analyses to identify detection gaps; actively participate in a dedicated, rotating 24/7 incident response team to ensure continuous operational coverage.
  • Communicate effectively by providing timely incident updates and daily reports to higher headquarters and Defensive Cyber Operations staff, and by preparing visual charts, diagrams, and comprehensive reports to support metrics analysis and enhance cybersecurity posture.
  • Optimize detection capabilities by developing specialized SIEM queries, tuning IDS/IPS rules to reduce false positives, and documenting identified vulnerabilities for operational integration.
  • Provide team and customer support by assisting various sections of the Defensive Cyber Operations team and conducting in-depth network security evaluations at customer sites.

Advanced Analysis and Expert Responsibilities:

  • Utilize SIEM technologies for advanced cyber forensics to detect and deter malicious actors targeting networked weapons platforms and U.S. DoD networks.
  • Analyze host and network events to assess operational impact and advisory capabilities.
  • Develop analytics based on indicators of compromise and perform forensic investigations by dissecting host data to determine the root causes, tactics, techniques, and tools used in cyber intrusions.
  • Prepare high-quality strategic reports, presentations, and recommendations for senior U.S. government intelligence and network operations officials.

#RCC-E

Hol dir deinen kostenlosen, vertraulichen Lebenslauf-Check.
eine PDF-, DOC-, DOCX-, ODT- oder PAGES-Datei bis zu 5 MB per Drag & Drop ablegen.