Recent Searches

You haven't searched anything yet.

17 Cyber Security Analyst Jobs in Augusta, GA

SET JOB ALERT
Details...
ISC Consulting Group
Augusta, GA | Full Time
0 Months Ago
HII Mission Technologies
Augusta, GA | Full Time
$96k-125k (estimate)
2 Days Ago
Prayon
Augusta, GA | Full Time
$76k-93k (estimate)
1 Month Ago
Prayon
Augusta, GA | Other
$102k-134k (estimate)
1 Month Ago
MKS2 Technologies
Augusta, GA | Full Time
$101k-127k (estimate)
11 Months Ago
Huntington Ingalls Industries
Huntington Ingalls Industries
Augusta, GA | Full Time
$86k-119k (estimate)
4 Days Ago
MKS2 Technologies
Augusta, GA | Full Time
$78k-107k (estimate)
8 Months Ago
Sargent & Lundy
Augusta, GA | Full Time
$131k-161k (estimate)
7 Months Ago
MKS2 Technologies
Augusta, GA | Full Time
$78k-107k (estimate)
11 Months Ago
MKS2 Technologies
Augusta, GA | Full Time
$78k-107k (estimate)
11 Months Ago
MKS2 Technologies
Augusta, GA | Full Time
$94k-122k (estimate)
2 Months Ago
MKS2 Technologies
Augusta, GA | Full Time
$67k-86k (estimate)
11 Months Ago
MKS2 Technologies
Augusta, GA | Full Time
$89k-117k (estimate)
11 Months Ago
BTS Software Solutions
Augusta, GA | Full Time
$82k-101k (estimate)
0 Months Ago
Cyber Security Analyst
Full Time | Business Services 0 Months Ago
Save

sadSorry! This job is no longer available. Please explore similar jobs listed on the left.

ISC Consulting Group is Hiring a Cyber Security Analyst Near Augusta, GA

About ISC Consulting Group

ISC is a Veteran Affairs Certified Service-Disabled Veteran-Owned Small Business (SDVOSB) headquartered in Sierra Vista, Arizona. Our mission is to enable superior decision making through information dominance. ISC provides advanced education, analytic and technical solutions within strategic DOD and commercial markets. We leverage the best minds and technologies to make a measurable difference

We specialize in delivering mission-critical services within the Intelligence Community and the U.S. Military, as well as the Federal Government and key commercial clients. ISC's core competencies include C5-ISR, IT Management Operations & Cyber Security, Instructional Solutions, Test & Evaluation Management Operation Services, and Big Data Business Intelligence and Data Analytics.

At ISC, our primary commitment is to provide client-driven excellence. This is only possible because of our most important asset, our people. We are recognized by our team members as the best place to work and develop a career, serving our clients with pride and professionalism. Our corporate culture reiterates the importance of "Mission first, people always."

Contract Overview

This requirement is to provide Information Technology services and support for enhancement, maintenance, and security of the Cyber Center of Excellence (CCoE) G6's Network, Enterprise Level Solutions, and IT Services.

Position General Responsibilities

  • Provide Cyber Security expertise, including feasibility studies, technical evaluation, justification, acquisition/procurement, installation, implementation, management, and administration of IT systems including virtualized infrastructures and systems (ex. VMWare and OpenStack).
  • Assist in the administration of an effective Cyber Security program that involves providing management of organizational risk advice, guidance, and assistance. Stay abreast on changes to Joint, DOD and Army doctrine as it pertains to cyber security and risk management.
  • Maintain up-to-date on IT news regarding network security and future trends in Cyber Security (ex. cloud computing security).
  • Maintain the CCoE security posture with proper certification and accreditation procedures/documentation/mitigation through continuous monitoring of CAT Is and II/III findings.
  • Update, maintain and test the Disaster Recovery Plan and Continuity of Operation (COOP) to reflect changes in the IT environment.
  • Assists in the coordination of vulnerability assessments, inspections, tests and reviews of the CCoE's information systems and processes.
  • Provide contact with customers and must maintain good customer relations as well as understand and apply the processes of IT project management.
  • Synthesizes system requirements, identifies and assesses alternative solutions, prepares the recommendation in either document and/or briefing format. Presents options to the customer for implementation. Sample expertise includes the preparation of security policies, security plans, user's guides, system administrator guides, or network security design document.
  • Responsible for either generating and/or coordinating the compiling of all document deliverables required for Certification & Accreditation (C&A).
  • Process, track and manage C&A packages into applicable systems (ex. eMASS).
  • Receive and analyze network alerts from various sources within the NE or enclave and determine possible causes of such alerts.
  • Coordinate with Computer Network Defense (CND) staff to report, resolve, mitigate, and validate network alerts.
  • Report lost/stolen/compromised Serious Incident/Personally Identifiable Information (SI/PII) to the Information Systems Security Manager (ISSM)
  • Perform analysis of log files from a variety of sources within the NE or enclave, to include individual host logs, network traffic logs, firewall logs, and intrusion detection system logs.
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
  • Monitor external data sources (e.g. CND vendor sites, Computer Emergency Response Teams, SANS, Security Focus) to maintain currency of CND threat condition and determine which security issues may have an impact on the NE or enclave.
  • Implement and enforce policies and procedures reflecting the legislative intent of applicable laws and regulations for the Network Environment (NE).
  • Prepare, distribute, and maintain plans, instructions, guidance, and standard operating procedures concerning the security of network system(s) operations.
  • Provide recommendations to the Cyber Security Division Chief for NE security requirements specific to an IT acquisition for inclusion in procurement documents.
  • Recommend resource allocations required to securely operate and maintain an organization's Network Environment Information Assurance (NE IA) requirements.
  • Participate in an IS risk assessment during the C&A process.
  • Provide recommendations to the Cyber Security Division Chief for security requirements for hardware, software, and services acquisitions specific to NE IA security programs.
  • Ensure that IA and IA enabled software, hardware, and firmware comply with appropriate NE security configuration guidelines, policies, and procedures.
  • Assist in the gathering and preservation of evidence used in the prosecution of computer crimes. The contractor shall provide assistance and support as directed by CCoE officials and Government investigators.
  • Ensure that NE IS recovery processes are monitored and that IA features and procedures are properly restored.
  • Review IA security plans for the NE.
  • Identify alternative functional IA security strategies to address organizational NE security concerns.
  • Ensure that IA inspections, tests, and reviews are coordinated for the NE.
  • Review the selected security safeguards to determine that security concerns identified in the approved plan have been fully addressed.
  • Evaluate the presence and adequacy of security measures proposed or provided in response to requirements contained in acquisition documents.
  • Support CCoE G6 to provide leadership and direction to NE personnel by ensuring that IA security awareness, basics, literacy, and training are provided to operations personnel commensurate with their responsibilities.
  • Make recommendations to the Cyber Security Division Chief and implement programs to ensure that systems, network, and data users are aware of, understand, and follow NE and IA policies and procedures.
  • Advise the Cyber Security Division Chief of Designated Approving Authority (DAA) level changes that affect the NE IA posture.
  • Support NE physical security assessments and recommend corrective actions as they relate to cybersecurity weaknesses
  • Help prepare IA certification and accreditation documentation.
  • Ensure that compliance monitoring occurs, and review results of such monitoring across the NE.
  • Assist in Administrative Tasks such as budget creation, account creation, task management, etc.
  • Serves as Trusted Agent or LRA for SIPRNET Public Key Infrastructure Tokens.
  • Create and/or maintain IT CCoE guidance (includes policies, SOPs, TTPs, etc) and conduct inspections for user adherence
  • Attend meetings directly related to duties IAW PWS to gain insight and/or provide subject matter expert (SME) guidance. Take legible notes and be able to provide them upon request.

Position Qualifications

  • Have a minimum of three (3) years of work experience in the area of Information Assurance, Cyber/Information Security
  • Have at least one (1) year of Certification and Accreditation & Cyber Risk Management experience: DoD RMF (DoD 8500, DoD 8510, NIST 800-37/-53), and DCID 6/3 and ICD 503 processes and implementing frameworks by performing risk assessments, system certification, and accreditation at all classification levels (NIPRNET, SIPRNET, and JWICS).
  • Have at least one (1) year of experience in security incident handling/incident response process, methods, and coordination with Regional Cyber Center-CONUS (RCC-C), Regional Network Enterprise Center (RNEC), NEC, etc.
  • Have demonstrated knowledge of network threats, attacks, and other methods of exploitation, and the ability to develop Tactics, Techniques, Procedures (TTPs) to mitigate, deter, and respond. (Threat Vulnerabilities and Reporting; Threats Reconnaissance; Digital Forensics; Social Engineering/Phishing; Syslog Monitoring)
  • Have knowledge of Cyber Security practices for cloud and virtual environments (ex. AWS, MS Azure, VMWare, and OpenStack)
  • Have working knowledge of application assessment, application security vulnerabilities, code review methodologies, and secure coding practices
  • Have strong knowledge of the development of CCoE Policy (Policies, SOPs, TTPs, etc.) and the conduct of the associated inspections for user adherence to the CCoE policy developed
  • Certifications Required - all of the following are required:
    • Baseline certifications. Approved baseline certification information: https://iase.disa.mil/iawip/Pages/iabaseline.aspx. Note: CEH will satisfy baseline certifications for both CSSP Auditor and CSSP Analyst
    • CSSP Auditor: CEH (red), CySA (blue),, CISA, or GSNA and
    • CSSP Analyst: GCIA, CEH (red), CySA (blue), GHIC
    • Computing Environment (CE) certifications: N/A - only required for IAT IAWF positions.
    • Be monitored in the Army Training and Certification Tracking System (ATCTS).
    • Successfully complete Information Assurance Fundamentals online course and exam at https://cs.signal.army.mil
    • Complete the Privileged Level Access Agreement (PLAA) annually.
  • This Personnel Security Standard for this position is IT-I (Personnel in IA positions with privileged-level access to control, manage, or configure IA tools or devices, individual and networked IS and devices, and enclaves).

ISC Consulting Group is an Equal Opportunity/Affirmative Action/VEVRAA Federal Contractor. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status or any other characteristic protected by law.

ISC Consulting Group gives preference to Internal Candidates. If no internal candidate meets our qualifications, external candidates will be given consideration.

Job Summary

JOB TYPE

Full Time

INDUSTRY

Business Services

POST DATE

03/07/2023

EXPIRATION DATE

01/06/2024

HEADQUARTERS

TUCSON, AZ

SIZE

50 - 100

FOUNDED

2019

CEO

BRANDI DUFOUR

REVENUE

$10M - $50M

INDUSTRY

Business Services

Show more

The job skills required for Cyber Security Analyst include Cybersecurity, Cybersecurity, Information Security, Leadership, Network Security, Risk Management, etc. Having related job skills and expertise will give you an advantage when applying to be a Cyber Security Analyst. That makes you unique and can impact how much salary you can get paid. Below are job openings related to skills required by Cyber Security Analyst. Select any job title you are interested in and start to search job requirements.

For the skill of  Cybersecurity
ClifyX
Full Time
$119k-150k (estimate)
Just Posted
For the skill of  Cybersecurity
Leidos
Full Time
$80k-98k (estimate)
2 Months Ago
For the skill of  Information Security
External
Full Time
$87k-108k (estimate)
2 Weeks Ago
Show more

The following is the career advancement route for Cyber Security Analyst positions, which can be used as a reference in future career path planning. As a Cyber Security Analyst, it can be promoted into senior positions as a Cyber Security Architect IV that are expected to handle more key tasks, people in this role will get a higher salary paid than an ordinary Cyber Security Analyst. You can explore the career advancement for a Cyber Security Analyst below and select your interested title to get hiring information.

Prayon
Full Time
$76k-93k (estimate)
1 Month Ago
Prayon
Other
$102k-134k (estimate)
1 Month Ago
MKS2 Technologies
Full Time
$101k-127k (estimate)
11 Months Ago

If you are interested in becoming a Cyber Security Analyst, you need to understand the job requirements and the detailed related responsibilities. Of course, a good educational background and an applicable major will also help in job hunting. Below are some tips on how to become a Cyber Security Analyst for your reference.

Step 1: Understand the job description and responsibilities of an Accountant.

Quotes from people on Cyber Security Analyst job description and responsibilities

A cyber security analyst needs to have a broad range of skills to be able to handle malware and security breaches.

01/24/2022: Newport News, VA

Cyber security analysts need to think like a hacker to understand the hacking process.

02/10/2022: Sioux Falls, SD

As cyber attacks and threats become more frequent, the demand for cyber security analysts continue to grow.

03/15/2022: Montgomery, AL

Cyber security analysts help to protect an organization by employing a range of technologies and processes to prevent, detect and manage cyber threats.

01/19/2022: Burlington, VT

The program also emphasizes the business aspects of cloud security such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.

03/24/2022: Los Angeles, CA

Step 2: Knowing the best tips for becoming an Accountant can help you explore the needs of the position and prepare for the job-related knowledge well ahead of time.

Career tips from people on Cyber Security Analyst jobs

Secure systems and ensure business continuity.

01/09/2022: Cleveland, OH

Address legal and regulatory requirements.

01/12/2022: Asheville, NC

General Data Protection Regulation (GDPR).

03/12/2022: Fort Wayne, IN

Aftermath of WannaCry Ransomware.

03/26/2022: Springfield, IL

Threat Response Engineering Consultant.

03/02/2022: Riverside, CA

Step 3: View the best colleges and universities for Cyber Security Analyst.

Butler University
Carroll College
Cooper Union
High Point University
Princeton University
Providence College
Show more