This site uses cookies. To find out more, see our Cookies Policy

Sr. IDS Analyst - Process/Content Manager in Washington, DC at ManTech

Date Posted: 4/2/2018

Job Snapshot

  • Employee Type:
    Full-Time
  • Job Type:
    Other
  • Experience:
    Not Specified
  • Date Posted:
    4/2/2018

Job Description

Group:


MCIS

Clearance Level Needed:


TS/SCI

Shift:


Day

Category:


Cyber




Become an integral part of a diverse team that leads the world in Mission, Cyber, and Intelligence Solutions. At ManTech International Corporation, you will help protect our national security while working on innovative projects that offer opportunities for advancement.

The Cyber Security Solutions Division of ManTech MCIS is looking for a highly motivated, qualified professional to fill a Senior Intrusion Analyst/Content & Process Manager position in Washington, D.C. The Analyst will provide security and intrusion analysis support, as well as sensor optimization and rule tuning to monitor and report on trends that may impact on the security of the organization&s mission, processes, infrastructure or employees. The Analyst will also closely work with information security engineers to design and develop new security solutions, architectures and use cases.

A wide range of knowledge and skills are needed such as:

-Possess broad knowledge in the design of security architectures

-Develop SIEM content, use cases, custom detection signatures

-Develop analytical workflows, processes and SOPs

-Tier 2 – 3 incident response support

-Host based security
-SOC Operations
-Strong analytical skills
-Data Mining
-Data Manipulation
-Intrusion detection & incident response
-Auditing
-Ability to work with large amounts of data

-Ability to handle stress and work well under pressure
-Windows scripting a plus

-Project Management a plus

Ideal candidates will be experienced in most areas of this skill set and have the ability to provide training to less skilled colleagues, adapt quickly to a fast paced, dynamic environment for high impact, mission-critical network security operations.

Qualifications:

Requires a Bachelor&s degree or equivalent and Five to 7 years of experience in IA or Cyber to include computer network surveillance/monitoring; vulnerability assessments; network protocols; network devices; computer security devices; hardware and software configurations; and network LAN/WAN system administration in support of information assurance.

Preferred:
Previous operational experience in a CIRT, SOC, or CERT environment. Working knowledge of SIEM tools. Experience with devices/utilities such as ArcSight, Splunk, ePO, FirePower, NetWitness, Wireshark/PCAP tools, Cisco NAC, Remedy are a plus. Additional knowledge areas of value include malware analysis, vulnerability assessment, network and application penetration testing, OSINT, threat hunting.

Candidate must be a US Citizen and must have a current/active US government Top Secret clearance and SCI eligible. Candidate must be willing to sit for a CI Polygraph once hired.


Hours: Monday – Friday 9am – 5pm; must be flexible to customer&s operations tempo as necessary.

Job Requirements

Requires a Bachelor's degree or equivalent and 5 to 7 years of experience in IA or Cyber to include computer network surveillance/monitoring; vulnerability assessments; network protocols; network devices; computer security devices; hardware and software configurations; and network LAN/WAN system administration in support of information assurance.