Posted on: September 9, 2020
Business Group HighlightsNavy Marine Corps
The Navy Marine Corps business group provides end-to-end IT
solutions to the Department of the Navy including transport,
networking, end user hardware and services, cybersecurity and
staffing. Using agile engineering and DevOps methods, we produce
mission-specific solutions to solve the Fleet's
challenges.ResponsibilitiesCybersecurity Intelligence Analyst is
responsible for monitoring security events and incidents and
correlating to potential threats. This position directly support
the NGEN Cyber Incident Response Team. Position is required as part
of minimum staffing for approved operating Staffing Model. Not
filling this position will impact SLRs and the ability to
proactively monitor the network and potentially reduce the overall
security posture of the network. Replacing previous job code with
replacement job code.
As part of CIRT Team the technician will: Coordinate with
enterprise-wide cyber defense staff to validate cyber alerts.
Document and analyze alerts from various sources within the
enterprise and determine possible causes of such alerts. Work with
stakeholders to resolve computer security incidents and
vulnerability compliance. Conduct research, analysis, and
correlation across a wide variety of all source data sets
(indications and warnings). Monitor external data sources (e.g.,
cyber defense vendor sites, Computer Emergency Response Teams,
Security Focus) to maintain currency of cyber defense threat
condition and determine which security issues may have an impact on
the enterprise. Provide summary reports as required of network
events and activity relevant to cyber defense practices. Perform
cyber defense trend analysis and reporting.
This position requires a working knowledge of cyber threats and
vulnerabilities, cyber defense and vulnerability assessment tools
and their capabilities, incident response and handling
methodologies, intrusion detection methodologies and techniques for
detecting host and network-based intrusions, system and application
security threats and vulnerabilities, information technology (IT)
security principles and methods, and cyber defense and information
security policies, procedures, and
regulations.QualificationsRequires 0 to 2 years with BS/BA or 6 to
8 years no degree.
8570 Certification: Security+ or equivalent
Experience working with the ACAS (analyze and report findings)
Experience working with Security Technical Implementation Guides
Experience with Information Assurance Vulnerability Alerts (IAVAs)
and Common Vulnerability and Exposures (CVE).
Knowledge of cyber threats and vulnerabilities.
Knowledge of cyber defense and vulnerability assessment tools and
Knowledge of vulnerability information dissemination sources (e.g.,
alerts, advisories, errata, and bulletins).
Knowledge of incident response and handling methodologies.
Knowledge of intrusion detection methodologies and techniques for
detecting host and network-based intrusions
Knowledge of information technology (IT) security principles and
methods (e.g., firewalls, demilitarized zones, encryption).
Knowledge of system and application security threats and
vulnerabilities (e.g., buffer overflow, mobile code, cross-site
scripting, Procedural Language/Structured Query Language [PL/SQL]
and injections, race conditions, covert channel, replay,
return-oriented attacks, malicious code).
Knowledge of what constitutes a network attack and a network
attacks relationship to both threats and vulnerabilities.
Knowledge of adversarial tactics, techniques, and procedures.
Knowledge of cyber defense and information security policies,
procedures, and regulations.
Knowledge of cyber-attack stages (e.g., reconnaissance, scanning,
enumeration, gaining access, escalation of privileges, maintaining
access, network exploitation, covering tracks).About PerspectaWhat
matters to our nation, is what matters to us. At Perspecta,
everything we do, from conducting innovative research to
cultivating strong relationships, supports one imperative: ensuring
that your work succeeds. Our company was formed to bring a broad
array of capabilities to all parts of the public sectorfrom
investigative services and IT strategy to systems work and
Our promise is simple: never stop solving our nations most complex
challenges. And with a workforce of approximately 14,000, more than
48 percent of which is cleared, we have been trusted to do just
that, as a partner of choice across the entire sector.
Perspecta is an AA/EEO Employer -
Minorities/Women/Veterans/Disabled and other protected
As a government contractor, Perspecta abides by the following
Pay Transparency Nondiscrimination Provision
The contractor will not discharge or in any other manner
discriminate against employees or applicants because they have
inquired about, discussed, or disclosed their own pay or the pay of
another employee or applicant. However, employees who have access
to the compensation information of other employees or applicants as
a part of their essential job functions cannot disclose the pay of
the other employees or applicants to individuals who do not
otherwise have access to compensation information, unless the
disclosure is (a) in response to a formal complaint or charge, (b)
in furtherance of an investigation, proceeding, hearing, or action,
including an investigation conducted by the employer, or (c)
consistent with the contractors legal duty to furnish information.
41 CFR 60-1.35(c).
Keywords: Perspecta, Norfolk , Cyber-Intelligence Analyst, Professions , Norfolk, Virginia
Didn't find what you're looking for? Search again!