What are the responsibilities and job description for the Network Based Systems Analyst IV position at Solutions³ LLC?
Title: Network Based Systems Analyst IV
Description:
Solutions³ LLC is supporting our prime contractor and their U.S. Government customer on a large mission critical development and sustainment program for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Solutions³ LLC provides advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based, and cloud-based cybersecurity analysis capabilities.
Solutions³ LLC is seeking a Network Based Systems Analyst IV to support this critical mission by providing front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility:
Description:
Solutions³ LLC is supporting our prime contractor and their U.S. Government customer on a large mission critical development and sustainment program for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Solutions³ LLC provides advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based, and cloud-based cybersecurity analysis capabilities.
Solutions³ LLC is seeking a Network Based Systems Analyst IV to support this critical mission by providing front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility:
- Must be a US Citizen
- Must have an active Secret clearance, TS/SCI is preferred
- Must be able to obtain DHS Suitability prior to starting employment
- 8 years of directly relevant experience in cyber systems engineering
- In collaboration with stakeholders, generate, prioritize, analyze, and validate detailed customer IT requirements:
- Determine whether those requirements are related to current CISA IT efforts and capabilities or constitute new requirements.
- Articulate the scope and function of existing capabilities and services to customers.
- Obtain and aggregate aspects of unstructured and unorganized customer requirements – such as ideas and needs articulated in emails, chat messages, spoken during calls and meetings, and included in various types of documentation.
- Host and lead structured facilitation sessions to generate requirements with customers and technical staff.
- Leverage IT knowledge and skillsets to “fill in gaps” and produce a comprehensive written requirement deliverable and define a “definition of done”.
- Conduct technical feasibility and resource analysis of those requirements.
- For requirements related to current CISA efforts:
- Explain to customers technical details of current capabilities offered by CISA, CSD, Threat Hunt (TH) and Engineering & Operations Services (EOS).
- Confer with the applicable POCs and utilize IT and INFOSEC knowledge to determine an appropriate course of action for delivering specific IT requirements (e.g., may require a submission into the EOS change management process or other action).
- Recommend efficiencies and optimization of existing capabilities to meet customer requirements.
- Confer with appropriate experts across CISA including personnel internal to EOS and TH, and external to TH – such as ME, CB, OTD and OCIO.
- Obtain concurrence and approval from stakeholders then submit those requirements into the EOS Requirements Management process.
- Track the submission and if determined to be necessary, submit it into the TH ReqMan process or other CISA processes.
- Complete steps in standard requirements management plans that focus on all stages of a project lifecycle.
- Regularly interface with stakeholders such as developers, engineers, network administrators and customers to monitor the progress and delivery of requirements.
- Provide technical IT consultation on capabilities and products being built.
- Trace requirements to work items and tasks, facilitate and conduct initial user acceptance testing if requested, document feedback and needed modifications, and validate of the completion of those requirements. Revise requirements as needed.
- Document requirements that are completed and/or unable to be met and include key metrics such as the level of resources and time needed to complete those deliverables. Retain the documents in designated repositories.
- Utilize the designated EOS Requirements Management platform (Jira/Confluence) to input, track and display all requirements within the assigned project/portfolio and/or stakeholder.
- Attend regular meetings - such as daily syncs - with EOS staff, project teams, and customers, and be able to articulate updates, planned daily activities, and completed accomplishments.
- Provide routine updates to EOS federal staff and stakeholders on work deliverables.
- During meetings, interface with key stakeholders and transcribe notes for further evaluation and action.
- Assist with modifying the underlying TECHMAN form fields and associated SOPs to enhance customer support.
- Knowledge in various IT fields that include but are not limited to systems and networking engineering, technical analytics, threat hunt incident response/ hunt deployment tools, cloud technologies, and databases.
- Experience with and technical understanding of cybersecurity attack-mitigation techniques and cybersecurity architectures
- Experience with Systems Engineering Lifecycle (SELC) processes and practices, Change Management practices, requirements management, traceability, and associated tools
- Possesses or quickly develops a comprehensive understanding of Government Information Security policies, regulations, and guidelines
- Must be able to work collaboratively across agencies and physical locations
- Knowledge and experience with Scaled Agile Framework (SAFe) or similar lean Agile framework
- Agile Systems Engineering and/or development experience
- DevSecOps or DevOps experience
- Experience and/or familiarity with architectural views including operational, technical standards, and system/services views and business, data, applications, and technology architectures using applicable standards (e.g., DODAF, FEAF)
- Experience and/or familiarity with software and system lifecycle methodologies, (e.g ISO, CMMI, ITIL, Agile, SAFe)
- Experience with requirements management tools (DOORS preferred)
- Experience and/or familiarity of the Risk Management Framework (RMF) and security and privacy controls (NIST 800-37 and NIST 800-53)
- DHS experience
- DoD 8570.1 IAT Level II
- Certified Systems Engineering Professional (CSEP)
- SAFe certification (SA, SP, SSM/SASM, RTE, POPM, SPD, ASE, or SPC)
Salary : $112,000 - $131,000