|
Inova Cybersecurity is looking for a dedicated Cyber Defense Analyst 3 to join the Team. This remote role will be full-time day shift working Monday - Friday. The Cyber Defense Analyst 3 serves as information security subject matter expert, provides subject matter expertise from a technical and operational perspective in support of policy and standards, applicable federal regulations, and other binding standards. Consistently incorporates a multidisciplinary/cross-functional approach to enhance technical outcome for assigned applications. Recognizes the contributions of all team members and implements all work with an interdisciplinary approach. Manages complex IT project/products in order to provide automated solutions that meet business needs. Maintains system applications and facilitates updates, new releases and system enhancements related to security build, deployment, and optimization of cross-functional system applications. Communicates project and team status to internal and external audiences including the operations teams, steering committees, executive sponsors, and project principles as required. Inova is consistently ranked a national healthcare leader in safety, quality and patient experience. We are also proud to be consistently recognized as a top employer in both the D.C. metro area and the nation. Featured Benefits:
- Committed to Team Member Health: offering medical, dental and vision coverage, and a robust team member wellness program.
- Retirement: Inova matches the first 5% of eligible contributions - starting on your first day.
- Tuition and Student Loan Assistance: offering up to $5,250 per year in education assistance and up to $10,000 for student loans.
- Mental Health Support: offering all Inova team members, their spouses/partners, and their children 25 mental health coaching or therapy sessions, per person, per year, at no cost.
- Work/Life Balance: offering paid time off, paid parental leave, flexible work schedules, and remote and hybrid career opportunities.
Cyber Defense Analyst 3 Responsibilities:
- Triages security events and offenses upon receipt across cybersecurity operations platforms. Escalates security events and security incidents based on established criteria including those that may cause ongoing and immediate impact to the environment. Coordinates incident response functions. Analyzes and reports organizational and system security posture trends.
- Triages cyber defense incidents, determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable expeditious remediation. Performs real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs). Tracks and documents cyber defense incidents from initial detection through final resolution. Writes and publishes cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies and develops content for cyber defense tools.
- Provides timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. Determines tactics, techniques, and procedures (TTPs) for intrusion sets. Recommends computing environment vulnerability corrections.
- Characterizes and analyzes network traffic to identify anomalous activity and potential threats to network resources. Provides daily summary reports of network events and activity relevant to cyber defense practices. Performs cyber defense trend analysis and reporting. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
- Performs analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
- Reads, interprets, writes, modifies, and executes simple scripts (e.g., Perl, VBScript) on Windows and UNIX systems (e.g., those that perform tasks such as: parsing large data files, automating manual tasks, and fetching/processing remote data).
- Coordinates with intelligence analysts to correlate threat assessment data. Conducts in-depth research, analysis, and correlation across a wide variety of all source data sets (indications and warnings) and documents after-action reviews.
- Provides subject matter expertise to the development of a common operational picture and of cyber operations-specific indicators.
- Briefs in threat and/or target current situations and evaluates threat decision-making processes.
- Assists in the coordination, validation, and management of all-source collection requirements, plans, and/or activities. Assists in the identification of intelligence collection shortfalls.
- Develops data standards, policies, and procedures. Manage the compilation, cataloging, caching, distribution, and retrieval of data. Analyzes and assesses the validity of source data to provide actionable recommendations.
- Specializes in one or more of the following: incident response, threat modeling, vulnerability management, forensic collection and examination, cyber investigation, cyber intelligence fusion, other cyber discipline.
Minimum Qualifications:
- Education: Bachelor's degree; or Associate's degree and 2 years relevant professional experience in addition to the minimum experience required; or HS Diploma/GED and 4 years relevant professional experience in addition to the minimum experience required
- Experience: 5 years in cybersecurity or information security
Preferred Qualifications:
- Previous response investigation experience preferred.
- Previous experience in computer forensics preferred.
- Previous CrowdStrike experience preferred.
This position is eligible for remote work for candidates residing in the following states - VA, MD, DC, DE, FL, GA, NC, OH, PA, SC, TN, TX, WV.
|