UIC Alaska

Cybersecurity Protect Analyst

Requisition Post Information* : Posted Date 2 months ago(11/30/2022 10:44 AM)
Requisition ID
2022-17780
Category
Information Technology
Location : Location
US-OH-Dayton
Travel Requirement
N/A

Overview

Bowhead seeks experienced Cybersecurity Protect Analysts to join our team onsite in Dayton, OH. The Cybersecurity Protect Analysts will ensure delivery of critical infrastructure services. These highly skilled individuals will work in various capacities alongside Computer Network Defense (CND) Analysts and Cybersecurity Engineers in support of a 24x7x365 cybersecurity service provider. The Cybersecurity Protect Analysts will perform vulnerability assessments and implement a variety of host-based security controls to prevent and/or limit the impact of an intrusion. The Cybersecurity Protect Analysts work in a larger team to deploy, implement, and sustain cybersecurity related functions.

Responsibilities

• Identifying vulnerabilities and assessing whether DREN assets conform to recommended security policies and configuration

• Conducting vulnerability scans monthly per subscriber using DoD-approved and recommended tools such as ACAS

• Providing the CDRUSSTRATCOM visibility and insight into the unclassified/classified to assess risk to the DODIN through reports, findings, and analyses resulting from vulnerability assessments

• Performing hardware/software inventory updates monthly using DoD-approved and recommended tools such as ACAS

• Providing the capability to receive open source, official, and classified threat, vulnerability, and attack notifications

• Providing subscriber sites details to take directed corrective actions to mitigate potential vulnerabilities or threats to their assets and capabilities

• Deploying the DoD's Host Based Security System (HBSS) in accordance with applicable DoD policies and guidance

• Operating and maintaining the HBSS server IAW with STIG requirements and ensuring HBSS agents are properly deployed in accordance with DoD guidance

• Ensuring all required HBSS modules are properly deployed, up-to-date, and active on subscribers' hosts in accordance with DoD guidance

• Configuring HBSS to perform periodic scans IAW current DOD guidance • Ensuring signature based and heuristic based malware protection capabilities are kept up to date with latest malware signatures and/or properly configured and tuned to protect against malware • Creating, maintaining and updating functional documentation, standard operating procedures and other documentation as required

Qualifications

• Bachelors' Degree in an IT related discipline AND at least three to five (3 to 5) years of experience as described above
• Must have and maintain CND-SP Baseline Certification (CEH or equivalent)
• Must have and maintain IAT II Baseline Certification (Security (+) or equivalent)
• Must have HBSS 301 required training for HBSS administration
• Must have ACAS certification
• Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint
• Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience
• Presentation and strong public speaking skills are required
• Strong interpersonal skills and good judgment with the ability to work alone or as part of a team

 

SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance with the ability to obtain/maintain a Top Secret/SCI. US Citizenship is a requirement for Secret clearance at this location.

 

In accordance with Executive Order 14042: Ensuring Adequate COVID Safety Protocols for Federal Contractors, candidates should be aware that they may be required to have received or be willing to receive the COVID-19 vaccine by date of hire.


Physical Demands:
• Must be able to lift up to 25 pounds
• Must be able to stand and walk for prolonged amounts of time
• Must be able to twist, bend and squat periodically

 

#LI-MN1

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed