Cyberspace Defensive Analyst 2 (Intelligence Analyst 2) with Security Clearance Information Technology (IT) - Annapolis Junction, MD at Geebo

Cyberspace Defensive Analyst 2 (Intelligence Analyst 2) with Security Clearance

Requisition Number:
18705 Required Travel:
0 - 10% Employment Type:
Full Time/Salaried/Exempt Hours Per Week:
40.
00 Security Clearance:
TS/SCI with Poly Level of
Experience:
Mid Job Description Mission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today's rapidly changing, multi-domain global security threats, and anticipate emerging threatsOur cyber professionals are on the cutting edge of cyberspace operations, delivering cyberspace options and effects for our nation in an ever-changing threat environmentOur experts provide a full range of expertise and capabilities across the spectrum of cyberspace operationsWe are an integral part of an important mission -- we go to work every day with the knowledge and pride that our accomplishments make a differenceCyber Electronic Warfare and Space team is currently seeking a Cyberspace Defensive Analyst 2 in support of an exciting new effort supporting one of our clients that is responsible for unifying the direction of cyberspace operations, strengthening DoD cyberspace capabilities, and integrating and bolstering DoD's cyber expertiseMinimum Qualificationso Bachelor's Degree in Information Systems Management, Computer Science, or related discipline (Additional four (4) years of job-related experience may be substituted for education requirement)o DOD 8140/DOD 8570 IAM Level III CertificationMinimum of five (5) years of experience in developing recommendations and COAs to solve complex cybersecurity problems, including:
o Coordinating network defense operations with DOD Component Commands / Services / Agencies / Field Activities, Intelligence Agencies, Law Enforcement, or U.
SGovernment organizationso Performing research and analysis of cybersecurity capabilities to satisfy data protection requirementso Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities, including web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential malicious activityo Coordinate and support cyber-related incidents and issues, including Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reportso Identifying and developing solutions, methods, and guidance for securing U.
Sinterests in cyberspace and developing white papers, reports, and presentations addressing these solutions o Identifying and drafting mitigation strategies for network boundary vulnerabilities to enable the security and integrity of interests in cyberspaceo Engaging with FCC or DIB on network protectiono Developing Memorandums of Understanding / Memorandums of Agreement Must possess an active TS/SCI/Polygraph for consideration Preferred Requirements Experience to include but not limited to:
o Serving as a Target Analyst Reporter.
o Collaborating or working with other centers on fleshing out the perspective on a situation, incident, or event.
o Drafting reports on cyber events, incidents, and documenting situations.
o Contributing to the development of cyberspace situational awareness products and cyberspace analysis duties with minimal guidance.
o Possessing a general understanding of intelligence analytic basic concepts to monitor, assess, and report on cyberspace operations, capabilities, and vulnerabilities.
o Contributing to the development of analytic approaches and recommendations to problems and situations for which data are incomplete, controversial, or which no precedence existsThis opportunity resides with Cyber & Electronic Warfare, a business group within HII's Mission Technologies divisionHII works within our nation's intelligence and cyber operations communities to defend our interests in cyberspaceOur deep expertise in network architecture, software and hardware development, cybersecurity and the electromagnetic environment uniquely enables us to support sensitive missions for federal agency partnersHII is a global engineering and defense technologies providerWith a 135-year history of trusted partnerships in advancing U.
Snational security, HII delivers critical capabilities ranging from the most powerful and survivable naval ships ever built, to unmanned systems, ISR and AI/ML analyticsHII leads the industry in mission-driven solutions that support and enable a networked, all-domain forceHeadquartered in Virginia, HII's skilled workforce is 44,000 strongFor more information, please visit:
hii.
comHII is committed to cultivating an inclusive company culture to promote collaboration and enhance creativity by hiring a diverse work forceHII is an Equal Opportunity/Vets and Disabled EmployerU.
SCitizenship may be required for certain positions.
Recommended Skills Investigation Security Management Law Enforcement Requisition Management Diversification (Investing) Loss Prevention Apply to this job.
Think you're the perfect candidate? Apply on company site Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.