Entering ManTech’s 50th year, we hold the distinct honor of being named a “Top 100 Global Technology Company” by Thomson Reuters. We have earned this and many other accolades over the years for our dedication to serving the missions of our nation’s most important customers: U.S. Intelligence, Defense and Federal Civilian agencies. All know us as a trusted partner offering best-in-class solutions in cyber, data collection & analytics, enterprise IT, and systems and software engineering tailored to meet their specific requirements.
Become an integral part of a diverse team in the Mission, Cyber and Intelligence Solutions (MCIS) Group. Currently, ManTech is seeking a motivated, mission oriented Principal Cyber Security Analyst, in the Clarksburg, WV area, with strong Customer relationships. At ManTech, you will help protect our national security while working on innovative projects that offer opportunities for advancement.
The FSS Division provides cyber solutions to a wide range of Defense and Intelligence Community customers. This division consists of a team of technical leaders that deliver advanced technical solutions to government organizations. Our customers have high standards, are technically adept, and use our products daily to support their mission of protecting national security. Our contributions to our customer’s success is driving our growth.
Job Description and Requirements:
- As a Principal Cyber Security Analyst, the tasks will include analyzing all relevant cyber security event data and other data sources for attack indicators and potential security breaches; produce reports, assist in coordination during incidents; and coordinate with the O&M team to maintain all security monitoring systems are on-line, up to date, and fully operational.
- Position Requires 7-9 years experience in cyber security analysis, incident response, or related IA/Security experience.
- Demonstrate best-practice knowledge and apply skills to deliver an effective solution specific to project needs,
- Experience in translating business and technical requirements into extensible, scalable and maintainable services and the demonstrated abilities to understand functional and technical specifications
- Monitor intrusion detection and prevention systems and other security event data sources on a 24x7x365 basis. This shall include holidays, weekends, and shift work as determined by the customer
- Determine if security events monitored should be escalated to incidents and follow all applicable incident response and reporting processes and procedures.
- Ability to problem solve, ask questions, and discover why things are happening.
- Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs.
- Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends, and provide focus and situational awareness on all issues.
- Reporting outputs will be reviewed and approved to ensure quality and metrics are maintained.
- Responsible for tuning and filtering of events and information, creating custom views and content using all available tools following an approved methodology and with approval and concurrence from management.
- Notify the Customer of significant changes in the security threat against the Customer networks in a timely manner and in writing via established reporting methods.
- Provide support for the A/V hotline and appropriately document each call in an existing tracking database for this purpose.
- Coordinate with the O&M team to ensure production systems are operational.
- Produce daily/weekly/monthly/quarterly reporting as required by management.
- Maintain system baselines and configuration management items, including security event monitoring “policies” in a manner determined and agreed to by management. Ensure changes are made using an approval process agreed to in advance.
- Coordinate with appropriate organizations regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact.
- Produce reports identifying significant or suspicious security events to appropriate parties. Include latest security threat information and tie back to specific intrusion sets of nation state actors when possible.
- Review assembled data with firewall administrators, engineering, system administrators and other appropriate groups to determine the risk of a given event
- Review and evaluate network modifications and recommend security monitoring policy updates.
- Establish procedures for handling each security event detected.
- Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary.
- Be able to create and add user defined signatures, or custom signatures, to compensate for the lack of monitoring in threat areas as warranted by threat changes or as directed by the customer. This includes creating content in Arcsight as needed.
- Maintain a network diagram depleting the relevant security checkpoints in the network.
- Develop and implement a methodology using Arcsight Use Case UML processes that identify procedures for correlating security events. Analysis should all be able to create custom content and develop new use cases to better correlate security event information.
- Develop and utilize “Case Management” processes for incident and resolution tracking. The processes should also be used for historic recording of all anomalous or suspicious activity.
- Identify misuse, malware, or unauthorized activity on monitored networks. Report the activity appropriately as determined by the customer.
- Maintain proficiency and skills through relevant training, conventions, conferences, and on-the-job training.
- Provide analytical support as needed for the overall projects and systems by working with engineers, O&M, and other personnel to ensure effective operations of all capabilities, piloting of new systems, and periodic updates to systems.
- Good interpersonal, organizational, writing, communications and briefing skills.
Key Word responsibilities: Cyber Security, Intrusion Detection, Reporting, IDS, Analysis and Escalation, Tracking, Arcsight Use Case UML, Case Management, Network Monitoring, A/V Hotline Support
Strong analytical and problem solving skills.
- Bachelor’s Degree in computer engineering, computer science, or other closely related IT discipline or Equivalent preferred and 7-9 years of related experience.
***Must be willing to work shift work, with shift differentials of 7% for afternoons and 10% for nights.***
US Citizenship required and clearable to Top Secret - TS must be obtained prior to setting a start date.