FWG has a need for a Tier II Cyber Security Analyst that possess excellent analytical & innovative skills; and, they are capable of identifying potential customers’ risk to enterprise systems and develop operational and technical solutions that mitigate or eliminate risks. The Candidate will work in a Security Operations Center (SOC) at a US Federal Agency Facility in Washington, DC. FWG’s Information Security Services involves supporting its customers with the optimal combination of people, processes and technologies to provide situational awareness through the detection, containment, and remediation of IT threats. To deliver this service, FWG requires Information Security Professionals with experience managing incidents for the enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported. Our Information Security Service leverages a variety of systems used by its customers, such as, security information and event management (SIEM) system and vulnerability assessment systems; governance, risk and compliance (GRC) systems; web site assessment and monitoring systems, application and database scanners; penetration testing tools; intrusion detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and Cyber threat intelligence; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM).
Tier II Cyber Security Analyst must have extensive experience working with various security methodologies and processes, advanced knowledge of TCP/IP protocols, experience configuring and implementing various of technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices. Must possess expert knowledge in two or more of the following areas: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Encryption, Web-filtering, Advanced Threat Protection.
Serves as a Tier II Cyber Security Analyst supporting one or more of the following areas:
· incident response
· monitoring and detection
· cyber intelligence analysis
Candidates shall also have a minimum of 3 years of specialized experience in one of the following areas:
a) Monitoring and Detection Analyst: Professional experience in cybersecurity, information risk management, or information systems risk assessment, and must be knowledgeable in many areas such as: Vulnerability Assessments, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Data Loss Prevention, Encryption, Two-Factor Authentication, Web-filtering, and Advanced Threat Protection.
b) Incident Response Analyst: Professional experience responding to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities.
c) Cyber Intelligence Analyst: Professional experience in incident detection and response and/or cyber intelligence analysis, and a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.
Required Experience and Education
· An active Secret clearance with ability to obtain TS Clearance.
· The ability to satisfy a company background check. This includes a work experience, education and criminal history records check (local and nationwide).
· Must have at least one of the following certifications:
o SANS: GCIH, GCIA
o SEI: CSIH
· Minimum five (5) years of professional experience in incident detection and response, malware analysis, or cyber forensics, and a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. In addition, minimum of three (3) years of specialized experience in one or more of the following areas:
o Monitoring and detection
o Incident Response
o Cyber intelligence analysis Desired Skills
· Experience in cyber government, and/or federal law enforcement.
· Experience with Cyber Kill Chain.
· Desired certifications:
o CCNP; CCNA-Security and/or MCSE
|LOCATION||Customer Site Washington, DC|
|EOE STATEMENT||We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status or any other characteristic protected by law.|
|ABOUT THE ORGANIZATION||FWG Solutions is a rapidly growing systems integrator and premier small business provider of Information Assurance & Cyber Security, Enterprise IT & Software Development, Engineering & Network Solutions and Program Management Services to government and commercial clients.
Headquartered in Washington, DC FWG is certified by the Small Business Administration (SBA) as a 8(a) and HUBZone firm. Our firm provides our associates with a dynamic, flexible and entrepreneurial work environment that is intellectually stimulating, fun and focused on career development and growth.
FWG Solutions is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, ethnicity, color, national origin, sex/gender, pregnancy, religion, age, marital status, sexual orientation, military/veteran status, disability, genetic information/history or any other personal characteristic protected by law. FWG welcomes all individuals with disabilities and protected veterans to apply for our jobs.
|NUMBER OF OPENINGS||1|
- #Cyber #Security Today: Jan. 7, 2019 — #iPhone call #scam, Germans #hacked and Android #spyware
- Conference 2019 – BSides Philadelphia – February 1, 2019 – February 1, 2019
- Petulance is no substitute for politics
- Bettering Threat #Intelligence And #Cyber #Security A New Role For $Blockchain?
- #Hacked #Instagram #Influencers Are Relying on Hackers To Regain Their Accounts