Cybersecurity Analyst Job Description Template
Our company is looking for a Cybersecurity Analyst to join our team.
Responsibilities:
- o Respond to security alarms and analyze and escalate incidents by process or management;
- Maintain proficiency in information systems security, networking, infrastructure, and policy;
- Recommend new capabilities and efforts to improve the effectiveness of the program;
- o Monitoring and resolution of security incidents within established customer Service Level Agreements;
- Employ effective web, email, and telephonic communications to clearly manage security incident response procedures;
- Assist with security event monitoring, correlation, and daily event reporting within a tiered Security Operations Center;
- Reviews system configurations to ensure compliance with security requirements and complies with established standards;
- Manages user profiles in the Army Training and Certification Tracking System (ATCTS);
- Interface with user community to understand their security needs and implements procedures to accommodate them;
- Write authorization and accreditation (A&A) documentation and ensure the systems are operated and maintained in accordance with these security plans;
- Provides reports to internal and external customers in response to queries and requests for computer security information;
- Support security planning, assessment, risk analysis, and risk management for client systems and programs;
- Perform Army Portfolio Management System (APMS) package management for AMRDEC Information Systems;
- Consults on tasks, provides leadership and guidance for others;
- Apply knowledge of IA policy, procedures, and workforce structure to implement secure networking, computing, and enclave environments.
Requirements:
- HS Diploma or GED;
- Top Secret Clearance;
- Top class SIEM tools and ticking system;
- Vulnerability Scanning;
- DDOS;
- Assist with security event monitoring, correlation, and daily event reporting within a tiered Security Operations Center;
- Mobile Threats;
- o Hands on experience with analyzing attack vectors such as;
- o Working knowledge of Windows or Linux systems;
- Log Analysis;
- Support security planning, assessment, risk analysis, and risk management for client systems and programs;
- Write authorization and accreditation (A&A) documentation and ensure the systems are operated and maintained in accordance with these security plans;
- Interface with user community to understand their security needs and implements procedures to accommodate them;
- DoD 8570-compliant Certification (COMPTIA Security+);
- Apply knowledge of IA policy, procedures, and workforce structure to implement secure networking, computing, and enclave environments.