Demo

Cybersecurity Intrusion Detection Analyst

UICGS / Bowhead Family of Companies
Vicksburg, MS Full Time
POSTED ON 4/26/2025
AVAILABLE BEFORE 5/25/2025
Bowhead is seeking a Cybersecurity Intrusion Detection Analyst to join our team in Vicksburg, MS. The Cybersecurity Intrusion Detection Analyst utilizes data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night.

Responsibilities

  • Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
  • Participates in the development and monitoring of policies and procedures for department or department operations.
  • Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes."
  • Receive and distribute AS&W information;
  • Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
  • Maintain internal and external source location information);
  • Coordinate AS&W information from other sources to aid in analysis of alerts.
  • Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
  • Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
  • Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
  • Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
  • Collect intrusion artifacts (e.g., source code, malware, and trojans)
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
  • Provide a 24/7x365 event/incident handling and analysis capability;
  • Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
  • Analyze detected cyber events to identify incidents;
  • Categorize and characterize cyber incidents;
  • Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
  • Analyze cyber incidents to develop specific responses;
  • Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
  • Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
  • Mitigate operational and/or technical impact due to cyber incidents;
  • Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.


Qualifications

  • Must possess Bachelor's degree or equivalent experience.
  • Must have at least 5 years intrusion detection experience.
  • Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience
  • Must have the certifications for DOD 8570 IAT Level II minimally.
  • Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
  • Must have the ability to earn DoD 8570 computing environment certification within 6 months.
  • Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
  • Ability to demonstrate strong knowledge of computer security concepts
  • Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
  • Advanced knowledge of network technologies and protocols
  • Advanced understanding of current threats and trends present in the Information Security and Technology field
  • Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.


SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance. US Citizenship is a requirement for Secret clearance at this location.

Physical Demands:

  • Must be able to lift up to 25 pounds
  • Must be able to stand and walk for prolonged amounts of time
  • Must be able to twist, bend and squat periodically


If your compensation planning software is too rigid to deploy winning incentive strategies, it’s time to find an adaptable solution. Compensation Planning
Enhance your organization's compensation strategy with salary data sets that HR and team managers can use to pay your staff right. Surveys & Data Sets

What is the career path for a Cybersecurity Intrusion Detection Analyst?

Sign up to receive alerts about other jobs on the Cybersecurity Intrusion Detection Analyst career path by checking the boxes next to the positions that interest you.
Income Estimation: 
$149,432 - $188,965
Income Estimation: 
$179,455 - $227,077
Income Estimation: 
$163,631 - $209,073
Income Estimation: 
$192,911 - $256,346
Income Estimation: 
$99,793 - $130,112
Income Estimation: 
$125,027 - $157,872
Income Estimation: 
$125,027 - $157,872
Income Estimation: 
$149,432 - $188,965
View Core, Job Family, and Industry Job Skills and Competency Data for more than 15,000 Job Titles Skills Library

Job openings at UICGS / Bowhead Family of Companies

UICGS / Bowhead Family of Companies
Hired Organization Address Indian Head, MD Full Time
SENIOR ENGINEERING TECHNICIAN (AT): The Sr. Engineering Technician position is responsible for supporting manufacturing ...
UICGS / Bowhead Family of Companies
Hired Organization Address Charleston, SC Full Time
SENIOR LOGISTICIAN (BSAD) Bowhead seeks a Logistician to join our team in supporting the upcoming Navy contract in Charl...
UICGS / Bowhead Family of Companies
Hired Organization Address Bedford, IN Full Time
Engineering Technician (F3008 2025-22797): Bowhead seeks an experienced Engineering Technician to support the NAVAIR Cre...
UICGS / Bowhead Family of Companies
Hired Organization Address Crane, IN Full Time
Logistics Analyst (F3008 2025-): Bowhead seeks a Logistics Analyst to support the NAVAIR Crew Served Weapons In-Service ...

Not the job you're looking for? Here are some other Cybersecurity Intrusion Detection Analyst jobs in the Vicksburg, MS area that may be a better fit.

Cybersecurity Analyst

InterSources, Jackson, MS

AI Assistant is available now!

Feel free to start your new journey!