Identification of Cybersecurity problems which may require mitigating controls.
Analyze network traffic to identify exploit or intrusion related attempts.
Recommend detection mechanisms for exploit and or intrusion related attempts.
Provide subject matter expertise on network based attacks, network traffic analysis, and intrusion methodologies.
Escalate items which require further investigation to other members of the Threat Management team.
Execute operational processes in support of response efforts to identified security incidents.
Participates in a team of Security operations engineers investigating alerts, anomalies, errors, intrusions, malware, etc. to identify the responsible, determine remediation, and recommend security improvements.
Follows precise analytical paths to determine the nature and extent of problems being reported by tools, e-mails, etc.
Follows strict guidance on reporting requirements.
Keeps management informed with precise, unvarnished information about security posture and events.
Promotes standards-based workflow both internally and in coordinating with US-CERT.
Engages with other internal and external parties to get and share information to improve processes and security posture.
Supervises and guide team efforts.
Communicates to CISO leadership.
Produces design documentation.
Leads analyzing/investigating reports or anomalies.
Requirements
Must be eligible to obtain a sensitive clearance – Position of Public Trust.
Must have 5+ years of relevant work experience.
Must have experience in: Endpoint Detection and analysis, Sysmon log analysis, IT security, Network traffic analysis.
Knowledge of Control Frameworks and Risk Management techniques.
Strong understanding of IDS/IPS technologies, trends, vendors, processes and methodologies.
Strong understanding of common IDS/IPS architectures and implementations.
Strong understanding of IDS/IPS signatures, content creation and signature characteristics including both signature and anomaly-based analysis and detection.
Certifications (one or more desired) DOD 8570.1-M Compliance at IAT Level II; CISSP, Certified Ethical Hacker (C|EH), Sec+, SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, or CCNA.
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Benefits
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services.
The ability to obtain and maintain a U.S. government issued security clearance is required.
Excellent interpersonal and organizational skills.
Collaborate with cross-functional teams to deliver high-quality security incident resolutions.
Director leading security operations and enhancing vulnerability management at IDEXX. Driving strategic execution and operational excellence across key domains in cybersecurity.
IT Security Operations Specialist ensuring security of global networks, systems, and data. Implementing security controls and performing advanced threat hunting using Microsoft Sentinel and Darktrace.
Staff SOC Analyst driving advanced threat detection and incident response for Sunrun's security team. Leading complex investigations, mentoring analysts, and improving detection capabilities in a remote setup.
GSOC Analyst monitoring global events and managing critical incidents for Netflix's security operations. Ensuring timely communication and assessment during major security threats.
GSOC Analyst focusing on critical events and risk management operations at Netflix. Monitoring global threats and coordinating incident management efforts in a hybrid work setting.
Security Operations Center Engineer enhancing security posture via automation and threat hunting. Requires strong experience with SIEM and SOAR platforms and Python scripting.
Security Operations Vulnerability Analyst II identifying and mitigating security vulnerabilities. Collaborating with teams to ensure timely risk remediation and protection of enterprise systems.
Cyber Defender (SOC Analyst) acts as the key point of contact for major security incidents. Coordinating response efforts and enhancing procedures at a leading AI - powered security partner.
Junior SOC Analyst at Core Specialty responsible for monitoring and triaging security alerts across IT environment. This role offers hands - on experience in cybersecurity with a fast - paced operational environment.
Security Operations Coordinator overseeing security strategies and managing operations for public safety in NSW. Collaborating with law enforcement and enhancing transport system resilience with flexible work options.