Join our Talent Network >

Cyber Counter Access Analyst

Job ID: 199396
Location: SHAW AFB, SC, United States
Date Posted: Jan 29, 2020
Category: Cyber
Subcategory: Cyber Sec Analyst
Schedule: Full-time
Shift: Day Job
Travel: Yes, 10 % of the Time
Minimum Clearance Required: Secret
Clearance Level Must Be Able to Obtain: Secret
Potential for Teleworking: No

Share: mail

Job Description

Description

Join SAIC’s Information Technology (IT) Support Services Team in the Network Operations and Security Center (NOSC) of the US Air Forces Central Command (USAFCENT) Communications Directorate (A6). This opportunity places you at the tip of the spear for Engineering, Operations and Maintenance, Cyber Security, and Defensive Cyber Operations supporting the warfighter in the Southwest Asia area.

 

USAFCENT is the air component of United States Central Command (USCENTCOM), a regional unified command. USAFCENT, in concert with its coalition, joint and interagency partners, delivers decisive air and space power on behalf of USCENTCOM for the security and stability of the Southwest Asia (SWA) region. The USAFCENT NOSC delivers cyberspace command and control (C2) superiority to the warfighter by engineering, implementing, securing, managing, operating and maintaining USAFCENT’s Non-Classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router (SIPRNet), USCENTCOM Partner Networks (CPN-X), and associated C2 networks, systems and services.

 

The USAFCENT NOSC executes the full-spectrum of IT services management and operations for USAFCENT networks 24 hour-a-day, 7 day-a-week (24/7); and is tasked by USCENTCOM to provide information assurance (IA) boundary intrusion detection and intrusion prevention for USCENTCOM components. Comprised of NOSC operations, operations support, cybersecurity, network engineering, and command support functions, the USAFCENT NOSC plans, engineers, installs, integrates, operates and maintains, protects and manages enterprise-wide network and systems architecture, infrastructure and services; and provides enterprise-level oversight to its subordinate and supported communications support activities.

 

Candidates will be working at Shaw AFB, SC and/or Lackland AFB, TX. Frequent temporary duty (TDY) and/or deployment travel to OCONUS locations in the USCENTCOM AOR is required to support sustainment, site surveys, installations, upgrades, integration, testing, troubleshooting and other mission-related requirements.

 

The candidate for this position provides solutions to a variety of technical problems of moderate scope and complexity where analysis of situations or data requires a review of the variety of factors through frequent use and application of technical standards, principles, theories, concepts and techniques.

 
The Counter Access Team:
  • Designs, tests, and implements secure operating systems, networks, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions.

  • Conducts risk and vulnerability assessment at the network, system and application level.

  • Conducts threat modeling exercises.
  • Develops and implements security controls and formulates operational risk mitigations along with assisting in security awareness programs.

  • Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.

  • Researches, evaluates and recommends new security tools, techniques, and technologies and introduces them to the enterprise in alignment with IT security strategy.

  • Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. 

  • Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring.

  • Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.

  • Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.

  • Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. 

  • May support cyber metrics development, maintenance and reporting.

  • May provide briefings to senior staff.
  • Utilizes COTS/GOTS and custom tools and processes/procedures in order to scan, identify, contain, mitigate and remediate vulnerabilities, and intrusions. 

  • Assists in the implementation of the required government policy (i.e., NISPOM, DCID 6/3), and makes recommendations on process tailoring.

  • Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.

  • Supports the formal Security Test and Evaluation (ST&E) required by each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results, and preparation of required reports.

  • Periodically conducts a review of each system's audits and monitors corrective actions until all actions are closed. 

  • May support cyber metrics development, maintenance and reporting.

  • May provide briefings to senior staff.  

Specific duties for this position include, but are not limited to:

  • Contractor shall monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, log and make recommendations for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis to Cybersecurity Analysts.

  • Build tactical and strategic network profiles for specific systems and complete network architecture.

  • Analyze network intrusion detection systems and conduct vulnerability assessments.

  • Utilize network intrusion devices and information assurance tools, including but not limited to, Internet Security Scanner (ISS), Cisco Security Agent (CSA), and other zero-day personal firewall and security agents.

  • Advanced Traffic Analysis. The contractor shall:

  • Provide an overall site-analysis profile to serve as a benchmark to identify unusual or suspicious activity.

  • Analyze live and historical data for events related to possible network infiltration

  • Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive actives and secure USAFCENT/USCENTCOM networks.

  • Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on USAFCENT networks.

  • Incident Response Analysis. The contractor shall:

    • Perform network traffic and host analysis to evaluate intruder activities using host and network-based monitoring system. Correlate information gathered to provide effective methods to protect the USAFCENT domain. Ensure appropriate notification action is taken to reduce the risk to the USAFCENT networks.

    • Conduct network and computer forensics on suspected and confirmed compromised system to determine the method of intrusion and corrective actions to be taken to prevent or detect similar future activities.

    • Develop methods to identify contain, log, and analyze intrusive activities and security vulnerabilities on USAFCENT networks. Prevent intruders from accessing USAFCENT resources. Maintain current knowledge on new vulnerabilities and exploits. Develop countermeasures (to include IDS/IPS signature development and correlation rule sets) to isolate, contain and prevent intrusive actives and secure USAFCENT/USCENTCOM networks.

    • Maintain current knowledge on existing and new malware behavior and propagation characteristics. Maintain current knowledge on the anti-virus tools currently in use by USAFCENT/USCENTCOM. Develop methods to identify, contain, log, and analyze malware-based activities on USAFCENT networks.

  • Vulnerability Analysis and Assessments. The contractor shall:

    • Utilize DOD mandated vulnerability scanner to scan for vulnerabilities on the USAFCENT enterprise.

    • Vulnerability Assessment: Contractor shall use vulnerability toolset to determine networks and systems security weaknesses and shortfalls. Research and coordinate vulnerability finding with Security Analysis to provide detailed fix actions.

    • Coordinate with other computer emergency response team (CERT) to ensure latest known vulnerabilities are properly identified and corrected.

    • Manage and maintain control of network intrusion detection systems (IDS). Ensure end-to-end operations for network and information technology systems.

    • Perform security device/sensor maintenance, troubleshooting and fault isolation to ensure network connectivity to sensor equipment.

    • Establish VPNs between AF and USCENTCOM sites for protected communications; and access control lists to restrict unauthorized access to network resources.

    • Monitor network traffic to determine system vulnerabilities and required fixes; apply established network security procedures, logs and makes recommendation for correcting network security incidents; and coordinate the escalation of security issues requiring detailed analysis to Security Analyst.

  • Intrusion Detections. The contractor shall contractor shall examine logs and information gained from network sniffers or protocol analyzers to determine if possible unauthorized access has occurred; identify, track and record suspected intrusion or actual security breach; and detail analyses in written reports for legal use. Contractor may be required to provide oral or written findings and explanation of events for any legal actions associated with security breaches.

  • Schedule, coordinate and attend daily Theater Network Control Central Cyber Defense briefings.

  • Facilitate weekly Information Assurance teleconferences.

     


Qualifications

Bachelors and two (2) years or more experience; Masters and 0 years related experience.  In lieu of a degree, four (4) years of additional experience is required.  In addition the following certifications and skills are required: CEH, MCSA, Firewall, Network+ CE, and ITIL Foundation.

Desired Qualifications

 

ITIL 4 Foundation certification or any ITIL v3 Intermediate certification. Any equivalent CSSP-A certification, if not the certification listed above.



Overview

SAIC is a premier technology integrator solving our nation's most complex modernization and readiness challenges. Our robust portfolio of offerings across the defense, space, civilian, and intelligence markets includes high-end solutions in engineering, IT, and mission solutions. Using our expertise in existing and emerging technologies, we integrate the best components from our own portfolio and our partner ecosystem to deliver innovative, effective, and efficient solutions. We are 23,000 strong; driven by mission, united by purpose, and inspired by opportunities. Headquartered in Reston, Virginia, SAIC has pro forma annual revenues of nearly $6.5 billion. For more information, visit saic.com. For ongoing news, please visit our newsroom. For SAIC benefits information, see Working at SAIC. EOE AA M/F/Vet/Disability

Share: mail

Similar Jobs

Cybersecurity Operations Controller [Cell]

SHAW AFB, SC, United States
Cyber

Cybersecurity Operations Controller

SHAW AFB, SC, United States
Cyber

Cyber Intelligence Analysis

SHAW AFB, SC, United States
Cyber

Senior Cybersecurity Operations Management

SHAW AFB, SC, United States
Cyber

Cyber Defense Posture Evaluation Team

SHAW AFB, SC, United States
Cyber

Senior Cyber Defense Posture Evaluation Team

SHAW AFB, SC, United States
Cyber

Senior Cyber Defense Posture Evaluation Team

SHAW AFB, SC, United States
Cyber

Senior Network Defense and Security Analysis Lead

SHAW AFB, SC, United States
Cyber

Cyber Policy & Governance Analyst

SHAW AFB, SC, United States
Cyber

Senior Cyber Assurance/ISSM Analyst

SHAW AFB, SC, United States
Cyber

Cyber Counter Access Analyst

SHAW AFB, SC, United States
Cyber

Cybersecurity Analyst

SHAW AFB, SC, United States
Cyber

Senior Cybersecurity Analyst

SHAW AFB, SC, United States
Cyber

Cyber Security Engineer

SHAW AFB, SC, United States
Cyber

Senior Cyber Security Engineer

SHAW AFB, SC, United States
Cyber

Vulnerability Management Analysis

SHAW AFB, SC, United States
Cyber

Senior Vulnerability Management Analysis

SHAW AFB, SC, United States
Cyber

Cybersecurity Lead

United States
Cyber

Cybersecurity Engineer Principal

United States
Cyber

Cybersecurity Engineer

United States
Cyber

Provide your information to receive jobs that fit you by keywords, location, and more,
and then receive great opportunities based on your skills and experience.

Join our Talent Network >