Cybersecurity Analyst supporting DISA's global IT enterprise security from Stuttgart, Germany. Monitoring, analyzing, and responding to cybersecurity threats and incidents with advanced technical skills.
Responsibilities
Monitors systems and networks for unauthorized infiltration, modification, destruction, exfiltration, or disclosure
Analyzes volumes of logs, network data, and output from firewalls, intrusion detection systems, and enterprise anti-virus systems in support of investigations for information systems security violations and incidents
Conducts cyber threat intelligence analysis, develops correlation techniques, correlates actionable cybersecurity events, participates in the coordination of resources during incident response efforts, and reports and tracks incident findings and resolutions to customers that include trends, responses, and mitigation actions
Research and reports on network threats, attacks, attack vectors, and methods of exploitation with a comprehension of cyber threat actor tactics, techniques, and procedures
Assesses, plans, and enacts measures including refinements to cybersecurity architecture, tools configurations, and detection signatures to help protect customers from security breaches and attacks on its computer networks and systems
Identifies and assesses solutions for automating cybersecurity analysis tasks
Requirements
Minimum of two (2) years of cybersecurity analyst experience
DoD 8570 Compliant for IAT Level II or above: Possess a CASP+ CE, CCNA Security, CCNP Security, CCSP, CISA, CISSP (or Associate), CND, CySA+, GCED, GCIH, GICSP, GSEC, Security+ CE, or SSCP certification
DoD 8570 Compliant for CSSP Analyst: Obtain a CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, PenTest+, or SCYBER certification within 6 months of starting
Understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth, and common security elements
Understanding of Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics, and complex technical reports on analytic findings
Understanding of malware analysis concepts and methods
Understanding of Unix/Linux as well as scripting and programming
Clearance: Active Top Secret with SCI access is required.
Cyber Security Analyst at Regions analyzing cyber threats and documenting security risks. Collaborating with teams on security posture and incident response efforts.
Global IT Security Analyst protecting Champion Petfoods' technology environment by monitoring security alerts and conducting hands - on investigations.
SOC Senior Analyst role overseeing 24/7 security operations, leading incident response and threat detection teams. Collaborating across teams to enhance organizational security posture and mentor junior analysts.
Cyber Security Analyst ensuring IT security and vulnerability management at Paysafe. Supporting compliance audits and collaborating with internal teams in Sofia.
Principal Cybersecurity Analyst managing SOX compliance activities and IT controls at Unisys. Responsible for ensuring the design, execution, and monitoring of ITGC processes.
Information Security Analyst role responsible for supporting security and privacy programs at Welocalize. Requires experience in information security and a strong desire for continuous learning.
Network Security Analyst focusing on designing and implementing secure network policies at Waste Management. Collaborating with teams to maintain robust security across all network layers.
Junior Cybersecurity Analyst at Minsait focusing on operational technology security and vulnerability management. Collaborating with engineering teams and ensuring security measures align with industrial process availability.
Security Analyst responsible for ensuring compliance and security for sensitive health data in a healthcare AI platform. Collaborating with various teams to embed information security in organizational practices.
Application Security Analyst at Ford monitoring and validating cloud security implementations. Collaborating across teams to manage vulnerabilities and enhance secure coding practices.