Position Title:
Mid-Level Cyber Defense Analyst
Location
Washington, D.C.
Work Schedule:
Currently hybrid
Clearance Needed:
Active Secret Clearance
Position Summary
Cybervance is a rapidly growing information security and information technology company in Washington, D.C. We are looking to hire a Mid-Level Cyber Analyst to be placed on a long-term contract supporting a U.S. Government civilian agency. The position is full-time/permanent and available immediately upon finding a qualified candidate with the appropriate background clearance.
Job Requirements
- Strong written and verbal communication skills.
- Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
- Knowledge of system administration, network, and operating system hardening techniques.
- Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
- Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
- Demonstrated ability to interact effectively with senior management and leadership.
- Ability to design incident response for cloud service models.
- Knowledge of incident categories, incident responses, and timelines for responses.
- Knowledge of incident response and handling methodologies.
- Knowledge of common networking and routing protocols (e.g., TCP/IP), services (e.g., web, mail, DNS), and their interactions.
- Knowledge of Application Security Risks (e.g., OWASP Top 10).
Position Responsibilities
- Coordinate incident response functions.
- Provide expert technical support to enterprise-wide cyber defense technicians to resolve incidents.
- Correlate incident data to identify vulnerabilities and recommend remediation.
- Analyze logs from various sources to identify threats.
- Perform cyber defense incident triage, including scope, urgency, and impact assessment.
- Conduct trend analysis and reporting on cyber defense activities.
- Perform initial forensic collection and analysis on enterprise systems.
- Handle real-time cyber defense incidents, including forensic collections and threat analysis.
- Analyze network alerts to determine causes.
- Track and document incidents from detection to resolution.
- Employ defense-in-depth principles.
- Collect intrusion artifacts for mitigation efforts.
- Coordinate with intelligence analysts for threat assessment.
- Monitor external data sources to stay updated on threats.
Certifications/Licenses
- Bachelor’s degree or higher.
- 5+ years of experience in malware analysis, digital forensics, penetration testing, incident handling, etc.
- Must obtain one of the following certifications within 3 months: CERT CSIH, ECC CEH, GIAC GCIH, GIAC GISF, or ISC2 CISSP.
- Active Secret clearance or eligibility to obtain one.
Additional Experience Preferred
- Experience with malware handling and reporting.
- Skill in preserving evidence integrity.
- Strong network security experience.
- Ability to recognize and categorize vulnerabilities.
- Experience in damage assessments and using security tools.
- Design incident response for cloud services.
Cybervance is an equal-opportunity employer. All qualified applicants will be considered without regard to race, color, age, religion, sex, sexual orientation, gender identity, national origin, disability, veteran status, or any other protected category.