What are the responsibilities and job description for the Cyber Security Analyst (On-Site & TS-SCI) position at JFL CONSULTING, LLC?
Primary Place of Performance: Pearl Harbor, HI
Mandatory Requirements: U.S. Citizenship and TS/SCI Clearance
Years of Experience: Mid - Sr Level (5 Years)
JFL Consulting is currently seeking a talented and motivated Cyber Security Analyst to join our team. The successful candidate will be part of a team of network, system, and security engineers tasked with the analyzing operational network traffic for vulnerabilities, coordinating and remediating found anomalies, and developing new dashboard views to support operations. If you are passionate about cybersecurity and interpreting and analyzing network traffic, have the requisite skills and qualifications, and are looking for an opportunity to grow within a dynamic organization, this position may be for you.
Required Skills and Qualifications:
ofKsCqB1vn
Mandatory Requirements: U.S. Citizenship and TS/SCI Clearance
Years of Experience: Mid - Sr Level (5 Years)
JFL Consulting is currently seeking a talented and motivated Cyber Security Analyst to join our team. The successful candidate will be part of a team of network, system, and security engineers tasked with the analyzing operational network traffic for vulnerabilities, coordinating and remediating found anomalies, and developing new dashboard views to support operations. If you are passionate about cybersecurity and interpreting and analyzing network traffic, have the requisite skills and qualifications, and are looking for an opportunity to grow within a dynamic organization, this position may be for you.
Required Skills and Qualifications:
- Strong communication and analytical skills
- Self-starter and problem solver with respect to IT and cyber related issues
- Possess the knowledge, skills, and ability to perform the advanced cyber analytical analysis
- Strong experience with security monitoring, threat hunting, packet analysis, malware analysis, and signature development
- Strong understanding of computer networking
- Experience conducting Info Operations, Computer Network Defense/Exploitation operations
- Experience with Linux environments (Red Hat, CentOS, Ubuntu)
- Working knowledge of network sensors and analytics tools (Zeek, Suricata, SecurityOnion, etc.)
- Working knowledge of network SIEM technology (Elastic, Splunk, etc.)
- Working knowledge of computer network vulnerability scanning and compliance analysis
- Some experience with scripting and programming languages (Perl, Python, C, etc.)
- Some experience with firewalls and network TAP technologies
- Familiarity with installing, configuring, and administering software applications
- Familiarity with configuring, managing, and maintaining networking equipment
- Familiarity with DoD’s IT system and network certification and accreditation processes to include system security authorization agreements
- Possess strong troubleshooting skills in problems with software and hardware
- Conduct advanced cyber analysis and formal reporting
- Liaise between customers, external stakeholders, assessment site POCs, and technical SMEs
- Provide technical insights and recommendations to the customer
- Collaborate with DoD leadership, customers, and authoritative subject matter expert
- Provide recommendations on appropriate find and fix actions
- Preferred to have a Bachelor’s or Master’s degree in a technical field such as computer science or engineering
- In lieu of a degree, direct related operational experience may be substituted
- Cyber Defense Analysts must hold an IAT Level II and CSSP Auditor certification as defined and described in DoDD 8570.01, 8570.01-M, 8140.01-03 and as amended
- 100% employer-paid medical, dental, vision plan for each employee and dependents
- 401(k) plan retirement plan with 3% company match and vesting from day one
- Generous leave policy including 15 vacation days, 5 sick days, 2 personal days
- Reimbursement for job-related certifications, generous training budget and company provided access to training platforms
ofKsCqB1vn