What are the responsibilities and job description for the Insider Threat Analyst UAM position at Mobius Consulting LLC?
Come join us! Mobius is seeking an Insider Threat User Activity Monitoring (UAM) Analyst to support the analysis, development, and implementation of UAM policies, procedures, standards, and methods for identifying, preventing, and protecting information, personnel, facilities, operations, or material where the loss could pose a direct threat to national security. Will serve as a member of a government-led Insider Threat – UAM Analysis Team, with a focus on Information Assurance (IA)/Computer Network Defense (CND) and Security. In this position you will apply your broad knowledge of Cybersecurity, counterintelligence, security, UAM, cyber threat analysis, incident response, intrusion detection, network/computer forensics, data loss prevention technology, enterprise audit analysis, and or/automated audit/anomaly threat detection technology to assist with the development and implementation of UAM policies, procedures, mitigation strategies, and processes to prevent insider threats. The Analyst will study, analyze, advise, research, and develop deliverables to advance the detection, deterrence and mitigation of insider threat activity in the Department of the Navy (DoN), while safeguarding National Security, service information and data on both Navy and civilian contractor’s information systems through the application of knowledge and resources in achieving the Navy’s mission.
Duties of an Insider Threat UAM may include:
- The contractor will assist in the initiation, planning, execution, monitoring, control and closing of various UAM projects.
- Assist in the development of briefs, presentations, Project Management Plans (PMPs), Work Breakdown Structures (WBSs), Integrated Master Schedules (IMSs), System Requirement Documents (SRDs), and Plans of Actions and Milestones (POA&Ms).
- Perform UAM systems demonstrations, analyzes audit data, and monitor alerts to identify anomalous/suspicious behavior and activities that present security violations and potential threats to Navy networks. Will conduct analysis and provide feedback of audit data collected to monitor, detect, and mitigate cyber and insider threats.
- Collaborate with pillar leads where appropriate to include IA, Security, and CI/LE to assist with the development of dashboards, filters, and audit policy triggers for audit capabilities.
- Perform and assist in regular trigger refinement based on the analysis of evolving information and behavioral activities across Navy networks.
- Provide management oversight for the planning, execution, and control of all software support activities, to include all functions and sub-tasks required to accomplish overall project objectives. This oversight shall include, but is not limited to, controlling project activities, generating required weekly status reports, technical reports and other related deliverables.
- Facilitate project and task management, providing technical oversight support for all software design, development, installation, testing, and deployment, operations and maintenance, and documentation tasks.
- Assist in development of business processes and workflows (technical or functional), SOPs, and documentation. The contractor shall provide Assessment and Authorization (A&A) support of the IT hardware and software.
- Provide advice and/or performs complex assignments involving the development, management, evaluation, implementation, or execution of UAM and/or other monitoring tools.
- Perform in one or more of the following areas: cyber threat analysis, incident response, intrusion detection, network/computer forensics, data loss prevention technologies, enterprise audit analysis, and/or automated Audit/Anomaly Threat Detection technology.
- Conduct information technology audits, incident responses, and/or network monitoring at the Enterprise level, to include the use of security tools to conduct such work.
Qualifications:
- Minimum 1-year experience in/with a Counter-Insider Threat Program.
- Computer Environment (CE) knowledge and skills
- Within 6 months candidates shall:
- Fulfill the requirements IAW DoD 8140.01 Cyberspace IA Workforce Improvement Program Information Assurance Manager Level 1 within six months after contract award.
- Obtain Certified Counter-Insider Threat Program - Fundamentals (CCITP-F) within six months of contract award.
- Obtain the Defense Counterintelligence and Security Agency Center for Development of Security Excellence Insider Threat Awareness Course (INT101.16)
Preferred Requirements:
- Certified Information Systems Security Professional (CISSP) certification.
- Project Management Professional (PMP) credential
Clearance
TS/SCI. The highest level of security required for this requirement is TOP SECRET/SCI and SI/TK/G/HCS//as necessary to work within a SCIF. Access to Joint World-Wide Intelligence Communication System (JWICS) is required.
Job Type: Full-time
Pay: $105,000.00 - $130,000.00 per year
Schedule:
- Monday to Friday
Ability to Commute:
- Arlington, VA 22202 (Required)
Ability to Relocate:
- Arlington, VA 22202: Relocate before starting work (Required)
Work Location: In person
Salary : $105,000 - $130,000