Search for More Jobs
Forward job to a friend
Apply without Registering
Apply by creating/using an account
Please enter your registered email address, and we'll email you a link to reset your password right away.
Responsible for network defense and continuous monitoring.
Responsible for the administration of network security devices to include intrusion detection systems, vulnerability scanners and other monitoring devices.
Provide analysis and triage of network and system anomalies that are considered Events of Interest (EOI).
Provide assessment of anomalies and determination of EOI, conduct incident handling procedures including initial reporting, requests for information, log and traffic analysis, containment and eradication recommendations, investigative tracking and preparing incident reports with event chronology, analysis methodology and remediation guidance.
Use CND tools to detect and analyze network, application, and system attacks.
CLEARANCE/BACKGROUND: Top Secret TRAVEL: 10%
Are customer-oriented and like technology challenges.
Able to Identify security risks, threats and vulnerabilities of networks, systems, applications and new technology initiatives.
Validate and test complex security architecture and design solutions from recommended vendor technologies and DoD.
Review logs and log consolidation/correlation in relation to overall information security.
YOUR KNOWLEDGE BASE INCLUDES
2 years SOC experience with network defense and continuous monitoring.
Practical experience in the analysis and triage of network and system anomalies that are considered Events of Interest (EOI) Provide assessment of anomalies and determination of EOI, conduct incident handling procedures including initial reporting, RFI, log and traffic analysis, containment and eradication recommendations, investigative tracking and preparing incident reports with event chronology, analysis methodology and remediation guidance.
Must have experience using CND tools to detect and analyze network, application and system attacks; these tools include: IDS/IPS, HIPS, Wireshark, Tcpdump, and Splunk.
Requires working knowledge of web application attack methodologies.
DESIRED: Experience with Cisco Firepower, BigIP, McAfee ePO, Nessus and ForeScout NAC
Ability to multi-task handling multiple meetings, schedules, deadlines, and stakeholder communication activities.
Computer Science, Information Systems or related technical field preferred
Certifications: DoD 8570 IA WIP IAM-II Certification (i.e. CISSP, CAP, CASP CE, CISM, GSLC)
We challenge you to come make your mark. Influence change. Work on vital missions. Advance your career.
Powertek Corporation is a high-energy IT company that encourages its employees to help shape its culture with imagination and ingenuity. Learn more at www.PowertekCorporation.com.
Matching 401k vested from day one.
Choice of Health Insurance Plans and an employee assistance program.
Company sponsored technical and management certifications.
PowertekU online education with 4400+ technical and business courses.
Educational tuition reimbursement and 529 Plan.
Robust Awards & Recognition Program + perks, discounts, generous referral program.
TO ALL APPLICANTS
Thank you for your interest and effort in applying for this position.
Powertek is an Equal Opportunity Employer and does not discriminate against minorities, women, protected veterans, and disabled individuals with regards to any employment decisions, to include hiring.
No unsolicited agency referrals please.
Apply by creating/using an account