Job Details

ID #52147372
Estado Missouri
Ciudad Springfield
Full-time
Salario USD TBD TBD
Fuente Criterion Systems
Showed 2024-07-22
Fecha 2024-07-23
Fecha tope 2024-09-21
Categoría Etcétera
Crear un currículum vítae

CSOC Analyst II

Missouri, Springfield, 65801 Springfield USA

Vacancy caducado!

OverviewAt Criterion Systems, we developed a different kind of business—a company whose real value is a reputation for excellence built upon the collective skills, talents, perspectives, and backgrounds of its people. By accepting a position with Criterion Systems, you will join a group of professionals with a collaborative mindset where we share ideas and foster professional development to accomplish our goals. In addition to our great culture, we also offer competitive compensation and benefit packages, company-sponsored team building events, and advancement opportunities. To find out more about how Criterion can help you take your career to the next level please visit our website: www.criterion-sys.com . Criterion Systems is a Military/Veteran Friendly Company therefore we encourage Veterans to apply. ResponsibilitiesWe are seeking a mission-focused CSOC Analyst II to support and contribute to our government customer’s success in Springfield, Virginia! Duties, Tasks & Responsibilities

Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cybersecurity incident response, including but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on the direction of the Government.

Coordinates with Security and Installations Directorate (SI), Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents.

Collaborates with appropriate authorities in the production of security incident reports.

Categorizes incidents and events.

Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated.

Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue/red team activity with open incidents/events.

Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event.

Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions.

Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken, and analysis are capable of being systematically reconstructed.

Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed.

Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events.

Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, including but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.

Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services.

Provides adversary attribution.

Performs malware analysis and signature development.

Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report.

Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander.

Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA-on-NGA networks and systems.

Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, including but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.

Execute custom scripts, tools, and capabilities to collect and analyze data, and respond to incidents/events when properly authorized by the Government.

Develops, documents, and provides the Government incident investigation reports which include sufficient information to document the entire life cycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down.

Conduct Quality Control reviews of a percentage of closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification.

QualificationsRequired Experience, Education, Skills & Technologies

Must be a US Citizen with an active TS SCI with CI poly or TS SCI with the ability to obtain a CI poly within 6 months of hire date.

Bachelor's degree or equivalent experience and a minimum 4 years of related work experience

Certification that is compliant with DoD 8140.01 and DoD 8570.01-M IAT Level II

CSSP Analyst Certification

Full time onsite supporting shift work Monday through Thursday from 6am - 4pm.

Travel Required of up to 10%.

Demonstrated experience supporting CSOC Teir 2.

Experience with Joint Incident Management System (JIMS) and Incident Case Management System (ICMS).

Detail oriented experience with written documentation in incident response.

Excellent written and oral communication skills.

Security Clearance Level

US Citizen with a TS/SCI with an adjudicated CI polygraph or ability to obtain a CI polygraph within 6 months of start date

Certification

Certification that is compliant with DoD 8140.01 and DoD 8570.01-M IAT Level II

CSSP Analyst Certification

Work Schedule

Full-time on-site; shift work Monday – Thursday 6am - 4pm.

Pay Rate

The projected compensation range for this position is $66,000 - $135,000. Please note that the salary information is a general guideline only. Criterion Systems considers factors such as (but not limited to) scope and responsibilities of the position, candidate's work experience, education/ training, key skills as well as market and business considerations when extending an offer.

Benefits Offered

Medical, Dental, Vision, Life Insurance, Short-Term Disability, Long-Term Disability, 401(k) match, Tuition/Training Assistance, Parental Leave, Paid Time Off, and Holidays.

Criterion Systems, LLC and its subsidiaries are committed to equal employment opportunity and non-discrimination at all levels of our organization. We believe in treating all applicants and employees fairly and make employment decisions without regard to any individual’s protected status: race, ethnicity, color, national origin, ancestry, religion, creed, sex/gender, gender identity/gender expression, sexual orientation, physical and mental disability, marital/parental status, pregnancy (including childbirth, lactation, and related medical conditions), age, genetic information (including characteristics and testing), military and veteran status, or any other characteristic protected by law. For our complete EEO/AA and Pay Transparency statement, please visit https://careers-criterion-sys.icims.com/.

Job LocationsUS-VA-SpringfieldID 2024-3298 Category Information Technology Type Mid

Vacancy caducado!

Suscribir Reportar trabajo