Operations Watch Analyst

Posted 6 Days Ago
Be an Early Applicant
North Charleston, SC
3-5 Years Experience
Security • Cybersecurity
The Role
The CND Incident Response Analyst identifies, investigates, and implements measures to protect data. Responsibilities include validating suspicious events, entering incidents into reporting systems, providing network intrusion detection, performing digital forensics, and supporting incident response actions. The role requires communication with multiple entities during significant incidents and familiarity with cybersecurity policies and procedures.
Summary Generated by Built In

Cyber Security Analyst 

North Charleston, SC 
Minimum of a Secret Clearance Required with ability to obtain TS/SCI

Position Description
As a CND Incident Response Analyst you will identify, isolate, investigate, inform, and implement measures to detect and protect data across a wide spectrum of sources and locations. You will validate suspicious events or reports and determine if the event constitutes an incident. You will ensure incidents are properly entered into the appropriate reporting system and determine the severity of the incident.

Position Requirements and Duties
• Maintains familiarity with CJCSM 6510.01B.
• Compiles and maintains internal standard operating procedure (SOP) documentation.
• Ensures associated documentation and capabilities remain compliant with CJCSM 6510.01B and other applicable policy directives.
• Provides network intrusion detection and monitoring, correlation analysis, incident response and support for the Cybersecurity Service Provider (CSSP) and its subscriber sites.
• Validates suspicious events or reports and determine if the event constitutes an incident and properly enter associated data into the appropriate reporting systems.
• Coordinates with JFHQ-DoDIN and supported entities regarding significant incidents to ensure proper analysis is performed and timely and accurate reporting of the incident is completed.
• Provides 24x7 support for the CSSP’s Incident Response capability during non-core business hours consistent with CSSP requirements as needed.
• Performs network and host-based digital forensics on Microsoft Windows based systems and other operating systems as necessary to enhance response to, support of, and investigation into significant network incidents.
• Possesses working knowledge of full packet capture PCAP analysis and accompanying tools (Wireshark, etc.).
• Explores patterns in network and system activity via log correlation using Splunk and supplemental tools
• Possesses understanding of IDS/IPS solutions to include signature development and implementation
• Participates in program reviews, product evaluations, and onsite certification evaluations.
• Overtime may be required as needed to support incident response actions (Surge)
• Due to the nature of the work required, operations are conducted 24/7/365 with three primary shifts. Choice of shifts will be made available with the understanding that placement is at the discretion of the CSSP Services Director and/or assigned manager.

Qualifications
• 4+ years experience in Cybersecurity Service Provider (CSSP) environment or similar
• DoD or DoN Cybersecurity Workforce (CSWF) Certification or compliance (DoDD 8140 or SECNAV M-5239)

Required Skills
• Knowledge of Incident Response Procedures
• Knowledge of Packet Analysis
• Knowledge of IDS/IPS solutions
• Familiarity with various Host-Based Tools
• Experience with Log Aggregation Tools
• Logical thinking and analytical ability
• Verbal and written communication ability
• Highly Desired Skills
• Knowledge of CJCSM 6510.01B
• Experience with Digital Forensics
• The ability to solve problems independently
Travel may be required to CONUS and OCONUS sites for incident response and to support other program needs.

Adapt Forward, LLC is a federal government contractor. As directed by Executive Order 14042: Ensuring Adequate COVID Safety Protocols for Federal Contractors, all current and newly hired employees, in the United States, are required to be fully vaccinated, or have an allowable accommodation in place, by January 18, 2022.

Top Skills

Cybersecurity
Ids/Ips
Packet Analysis
The Company
HQ: North Charleston, SC
90 Employees
On-site Workplace
Year Founded: 2015

What We Do

Adapt Forward specializes in Defensive and Offensive cyber operations. We strive to rewrite the rulebook on how Cyber Defense and Incident response is done with a unique blend of offense to validate our defense.

Jobs at Similar Companies

Coro Logo Coro

Marketing Operations Manager

Artificial Intelligence • Cloud • Information Technology • Security • Software • Cybersecurity • Data Privacy
Hybrid
Chicago, IL, USA
286 Employees

MacPaw Logo MacPaw

Event Coordinator (MacPaw Space)

Information Technology • Security • Software • Cybersecurity • App development • Data Privacy
Hybrid
Kyiv, Kiev, UKR
550 Employees

Silverfort Logo Silverfort

Sales Operations Analyst

Information Technology • Sales • Security • Cybersecurity • Automation
Remote
United States
357 Employees

Similar Companies Hiring

Coro Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • Cloud • Artificial Intelligence
Chicago, IL
286 Employees
MacPaw Thumbnail
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
Cambridge, MA
550 Employees
Silverfort Thumbnail
Security • Sales • Information Technology • Cybersecurity • Automation
US
357 Employees

Sign up now Access later

Create Free Account

Please log in or sign up to report this job.

Create Free Account