What are the responsibilities and job description for the Defense Network Exploitation Analyst (Level 1 - 4) position at Markon?
Markon's partner company is looking for multiple Defense Network Exploitation Analysts for our Fort Meade Customer.
Responsibilities
The Computer Network Defense Analyst will:
- Thoroughly understand all aspects of computer and network security, including firewall administration, encryption technologies and network protocols
- Protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks
- Have the ability to identify and convert data; analyze system alerts; and report on computer probe and network infiltration attempts on network infrastructure
- Keep abreast of industry security trends and developments, as well as applicable Government regulations
Qualifications
Required:
- TS/SCI FS Polygraph with this client is required.
A Bachelor’s degree plus 5 years of relevant experience, or a Master’s degree plus 3 years of relevant experience, or a Doctoral degree and 2 years of relevant experience. The following may also be considered for individuals with in-depth experience that is clearly related to the position: an Associate’s degree plus 7 years of relevant experience; or at least 18 semester hours of military coursework/training in networking, computer science, or cyber topics plus 7 years of relevant experience.
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security).
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirement, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), cyber Defense Operations will be considered towards the relevant experience requirement (i.e., 20-24 weeks course will count as 6 months of experience, 10-14 weeks will count as 3 months of experience).
Desired:
- CEH Certified Ethical Hacker
- CFR CyberSec First Responder
- CySA CompTIA Cybersecurity Analyst
- GCFA GIAC Certified Forensics Analyst
- GCIH GIAC Certified Incident Handler
- SCYBER Cisco Cybersecurity Specialty Certification
- CNDSP Computer Network Defense Service Provider
- CSSP-IR DoD Cyber Security Service Provider for Incident Responder