Cyber Security Watch Officer (Third Shift) - Military veterans preferred

2018-11-19
ManTech (www.mantech.com)
Other

/yr

  full-time   employee   contract


Mclean
Virginia
United States

Entering ManTech’s 50th year, we hold the distinct honor of being named a “Top 100 Global Technology Company” by Thomson Reuters. We have earned this and many other accolades over the years for our dedication to serving the missions of our nation’s most important customers: U.S. Intelligence, Defense and Federal Civilian agencies. All know us as a trusted partner offering best-in-class solutions in cyber, data collection & analytics, enterprise IT, and systems and software engineering tailored to meet their specific requirements.

Become an integral part of a diverse team in the Mission, Cyber and Intelligence Solutions (MCIS) Group. Currently, ManTech is seeking a motivated, mission oriented Cyber Security Watch Officer, in the McLean, Virginia area, with strong Customer relationships. At ManTech, you will help protect our national security while working on innovative projects that offer opportunities for advancement.

The NIS Division provides mission solutions to a wide range of Defense and Intelligence Community customers. This division consists of a team of technical leaders that deliver advanced technical solutions to government organizations. Our customers have high standards, are technically adept, and use our products daily to support their mission of protecting national security. Our contributions to our customer’s success is driving our growth.


Responsibilities:

• Function as invstigative lead for a team of analysts while identifying active threats to the customer environment
• As required, brief senior leadership daily on emerging threats, high profile incidents, and upcoming events
• Possess experience leading cyber, technical, or analytical teams
• Conduct cyber intelligence link analysis utilizing open-source and classified research on emerging/trending threats and vulnerabilities
• Collaborate between CIRT elements as necessary during incident detection and response stages
• Respond promptly to all request for support whether telephonic, via e-mail or instant messenger
• Create releasable finished intelligence products and reports for the IC as well as IC Senior Leadership
• Maintain incident case management database for all reported incidents
• Analyze incidents and events captured in the Case Management Database for trends, patterns, or actionable information
• Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness
• Leverage existing business processes and where necessary define and document new repeatable business processes and procedures
• Establish a baseline understanding of IC-wide network assets and capabilities through community outreach and persistent communication with IC elements
• Research external information on events, incidents, outages, threats, and technical vulnerabilities
• Coordinate and disseminate the best course of action for the enterprise during cybersecurity events, incidents, outages, and threats with partners
• Coordinate individual organizational actions to reduce overall shared risk
• Assess incidents to identify type of attack, estimate impact, and collect evidence
• Recommend range of mitigation actions for decision making at the Action-Officer and Senior Leadership level

Required Experience/Skills:
• Excellent interpersonal, organizational, writing, communications, and briefing skills

• Strong analytical and problem solving skills

• Minimum of five years of progressively responsible experience in Cyber Security, InfoSec, Security Engineering, Network Engineering with emphasis in cyber security issues and operations, computer incident response, systems architecture, data management

• Familiarity with adversary techniques, tactics, and procedures

• Strong network, operating system, and/or programming skills

Required Tools:
Familiarity with the following classes of enterprise cyber defense technologies:

• Security Information and Event Management (SIEM) systems
• Network Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
• Host Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
• Network and Host malware detection and prevention
• Network and Host forensic applications
• Web/Email gateway security technologies


Required Certifications:
DOD 8570 IAT Level I or CSSP-IR

Required Degree:
BS (bachelor's degree in electrical engineering, computer engineering, computer science, or other closely related IT discipline)

Security Requirements:
TS/SCI with Full Scope Poly


Degrees See Qualifications
Years of Experience See Qualifications
Position Type Full-Time
Shift Multiple, but static

Advertisement