Enable job alerts via email!

Cybersecurity Analyst III (Incident Response)

Washington Metropolitan Area Transit Authority

Washington (District of Columbia)

On-site

USD 80,000 - 110,000

Full time

15 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is looking for a Cybersecurity Analyst III to join their innovative team. This role involves safeguarding digital landscapes by identifying and mitigating security threats while collaborating with top-tier professionals. You will conduct in-depth assessments and develop robust security measures using cutting-edge tools. The position offers mentorship opportunities and a collaborative environment that values your expertise. If you're ready to enhance your cybersecurity skills and contribute to a mission-driven organization, this is the perfect opportunity for you.

Benefits

Competitive compensation
Continuous learning opportunities
Mentorship programs
Comprehensive benefits package

Qualifications

  • 4+ years of experience in cybersecurity roles focusing on incident response.
  • Strong understanding of NIST Cybersecurity Framework and data analytics.

Responsibilities

  • Identify and remediate security threats to protect information systems.
  • Conduct security assessments and develop countermeasures against threats.

Skills

Cybersecurity Analysis
Incident Response
Data Analytics
Threat Intelligence
NIST Cybersecurity Framework

Education

Bachelor's Degree in Computer Science
Bachelor's Degree in Cybersecurity

Tools

Splunk
Crowdstrike
Varonis

Job description

Cybersecurity Analyst III (Incident Response)

Are you passionate about safeguarding digital landscapes and collaborating with top-tier professionals? WMATA is seeking a Cybersecurity Analyst III to join our dynamic team. In this role, you will leverage your technical expertise to identify, analyze, and mitigate security threats, ensuring the integrity and confidentiality of our systems. You will conduct in-depth security assessments, develop robust security countermeasures, and collaborate with cross-functional teams to design and deploy innovative security solutions. You will be using state-of-the-art cybersecurity tools like Splunk, Crowdstrike, and Varonis to enhance our security posture while working in our Cyber Fusion Center.The Cybersecurity Analyst III role allows you Mentorship opportunities, allowing you to share your knowledge and experience with junior team members, fostering their growth and development. You will also benefit from guidance and insights from seasoned professionals, enhancing your own skills and career trajectory.

We offer a collaborative environment where your ideas and expertise are valued, along with opportunities for continuous learning and professional growth. With cutting-edge tools and technologies at your disposal, you will enhance your cybersecurity skills while enjoying a competitive compensation and benefits package. If you're ready to take your cybersecurity career to the next level and work alongside industry leaders, apply now and be a part of our mission to protect and innovate!

Minimum Qualifications

Education

  • A Bachelor¿s degree from an accredited college or university

Experience

  • Four (4) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted

Preferred

Education

  • A Bachelor¿s Degree in Computer Science, Cybersecurity or a related technical field

Medical Group

Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations.

Summary

The Cybersecurity Analyst III is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitor information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats.

Essential Functions

  • Provides senior level support regarding data analytics strategies based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated.
  • Provides senior level support regarding the development of cyber threat indicators (attacks and compromise) monitoring to maintain awareness of the status of the highly dynamic operating environment; Coordinates and performs the collection, processing, analysis, and dissemination of cyber threat/warning assessments. Ensure vulnerabilities are identified as early as possible and mitigated.
  • Provides senior level support regarding the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats. Ensure vulnerabilities are identified as early as possible and mitigated.
  • Senior level support regarding the development of assessment plans and measures of performance and/or effectiveness. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures WMATA has a properly managed cyber analysis framework.
  • Provides senior level support regarding the assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures Washington Metropolitan Area Transit Authority (WMATA) has a properly managed and reportable cyber threat intelligence awareness program.
  • Provides senior level support regarding the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Ensures vulnerabilities are identified as early as possible and mitigated.
  • Provides senior level support regarding the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, as needed, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. To ensure real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).
  • Provides senior level support regarding incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, or to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures the organization can respond to attacks quickly and eliminate threats.
  • Provides senior level support regarding the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., legal department) and external (e.g., law enforcement agencies, vendors, public relations professionals). Ensures the organization can respond to attacks quickly and eliminate threats.
  • Provides senior level support regarding the process to apply tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures vulnerabilities are identified as early as possible and mitigated.
  • Provides senior level support regarding the activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. To ensure the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices.
  • Provides senior level support regarding detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate, and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. To ensure the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices.
  • Provides senior level support regarding the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations being the liaison between the security engineering and authorizing official (as needed). To ensure the analysis of the information (data) from various sources within the enterprise and recognize a possible security violation or threat.
  • Provides senior level support regarding the analysis to identify, collect, examine, and preserve evidence using controlled and documented analytical and investigative techniques. The analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. To ensure forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.

The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision.

Evaluation Criteria

Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience.

Evaluation criteria may include one or more of the following:

  • Skills and/or behavioral assessment
  • Personal interview
  • Verification of education and experience (including certifications and licenses)
  • Criminal Background Check (a criminal conviction is not an automatic bar to employment)
  • Medical examination including a drug and alcohol screening (for safety sensitive positions)
  • Review of a current motor vehicle report

Closing

WMATA is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, national origin, disability, status as a protected veteran, or any other status protected by applicable federal law.

This posting is an announcement of a vacant position under recruitment. It is not intended to replace the official job description. Job descriptions are available upon confirmation of an interview.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Information Systems Security Officer (ISSO)

TIAG

Washington

Remote

USD 80,000 - 120,000

4 days ago
Be an early applicant

Senior AWS Security Engineer- Remote

Lensa

Great Falls Crossing

Remote

USD 98,000 - 167,000

6 days ago
Be an early applicant

Cyber Engineer

Saic

Mississippi

Remote

USD 80,000 - 120,000

7 days ago
Be an early applicant

Cyber Engineer

SAIC

Mississippi

Remote

USD 80,000 - 120,000

5 days ago
Be an early applicant

Cyber Security C&A Analyst

Amyx, Inc.

Virginia

Remote

USD 70,000 - 130,000

19 days ago

Cybersecurity Certification & Accreditation (C&A) Analyst

Beshenich Muir & Associates

Fort Belvoir

Remote

USD 80,000 - 110,000

25 days ago

Cyber Security Assessor - Expert

Guidehouse

Great Falls Crossing

On-site

USD 100,000 - 130,000

Today
Be an early applicant

Cybersecurity Operational Technology (OT) Specialist (REMOTE - TRAVEL)

Chinook Systems

Arlington

Remote

USD 80,000 - 110,000

27 days ago

Security Operations Center (SOC) Analyst - (100% Remote) - Level 3

The Mom Project

Remote

USD 90,000 - 130,000

2 days ago
Be an early applicant