Information Security Analyst, Senior [2022-044]



• Review Cyber Intelligence and identify how current threats affect US BICES networks.

• Performs Cybersecurity Detection and Incident Response activities for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures

• Review cyber events and document Cybersecurity incidents as directed in SINCE and ServiceNow. Additionally, produce After Action Reports to close Cybersecurity incidents

• This position will work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, SPLUNK, SIEM, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.

• Work with vendors to ensure the CND Tool suits detect and capture required cyber incidents, to include latest industry threats and zero-days, ETC….

• Review intelligent reports and provide daily Cyber Assessment on the impact to US BICES networks.

• Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations

• Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity

• Research and develop methods of tracking and detecting malicious activity within a network

• Be available for after-hours support when required. Incident response is a vital positions to respond to critical cyber-attacks and our Enterprise is a 24/7 operation.

• Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks

• Continuously improve processes for use across multiple detection sets for more efficient operations

• Perform malware analysis with CND tools

• Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort)

• Create Splunk dashboarding, reports, and alerts with reference to Security detection and Incident Response.

• Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.

• Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats

• Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, ST&Es, and CCRI

• Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems

• Assists with implementation of countermeasures or mitigating controls

• Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices

• Work with the Information Assurance Team, Security manager and GOVT ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.

• Provides guidance and work leadership to less-experienced technical staff members

• Maintains current knowledge of relevant technology as assigned

• Participates in special projects as required.

• Provide Incident Detection through understand malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.

Required Skills:

• Comprehensive knowledge of data security administration principles, methods, and techniques

• Must meet DOD 8570.01M requirements for IAT Level II & CSSP-Incident Responder.

• Requires familiarity with System & Network concepts, user authentication, and use of Cyber Stacks

• Requires understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01 and other applicable policies

• Security Operations Center (SOC) Experience

• ESS (HBSS) Proficiency.

• ACAS Proficiency.

• SPLUNK & SYSLOG data normalization.

• The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment.

• The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment.

• Depending on job assignment, additional specific certifications may be required

• The above-listed job description is not intended to be, nor should it be construed as, exhaustive of all responsibilities, skills, efforts, or working conditions associated with this job. Requests for reasonable accommodations will be considered to enable individuals with disabilities to perform the principal (essential) functions of this job.

Bachelor of Science

5+ years of experience required.

Tampa, FL



In compliance with Colorado’s Equal Pay for Equal Work Act, the salary range for this role is $68,000 - $85,000. Please note, salary is based on education, experience, and responsibilities.

U.S. Citizenship is required. EOE including disability/vet
Equal Employment Opportunity Information