View all jobs

TIER II ANALYST

Washington, DC · Information Technology
TIER II ANALYST

Location
Washington, DC

Clearance Requirement:
Secret Security Clearance


All Tier 2 Analyst candidates shall have a minimum of five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics, or a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field = = with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics.  Candidates must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices, and must possess expert knowledge in two or more of the following areas related to cybersecurity:
•       Vulnerability Assessment
•       Intrusion Prevention and Detection
•       Access Control and Authorization
•       Policy Enforcement
•       Application Security
•       Protocol Analysis
•       Firewall Management
•       Incident Response
•       Encryption
•       Web-filtering
•       Advanced Threat Protection
 Of the years of experience described above, Tier 2 Analyst candidates must have three years of the following specialized experience:

Monitoring and Detection Analyst
Shall have a minimum of three (3) years of professional experience in cybersecurity, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention, Encryption, Two-Factor Authentication, Web-filtering, and Advanced Threat Protection. 

Incident Response Analyst
 
Shall have a minimum of three (3) years of professional experience responding to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities. 

 
Cyber Intelligence Analyst
 
Shall have at least three (3) years of professional experience in incident detection and response and/or cyber intelligence analysis, and a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.

 
Digital Media Forensics Analyst
 
Shall have a minimum of five (5) years of professional experience performing digital media forensic analysis, static malware code disassembly/analysis, and/or runtime malware code analysis.

 
Email Security Analyst:  
Shall have a minimum of five (5) years of professional experience in email security, which includes identification of phishing attempts, malware detonation, and knowledge of the DHS SOC email analysis toolset. 

Certification Requirements (Any one of the following)
CompTia A+

GCIA Intrusion
GPEN - Penetration
GWAPT - Web Application Penetration Tester
GISF - Security Fundamentals
CISSP - Certified Cloud Security Professional

CISSP - Certified Information System Security (Preferred)
More Openings
General Clerk II
Systems Analyst
Powered by