Cybersecurity Analyst Job Description

Cybersecurity Analyst Job Description Template

Our company is looking for a Cybersecurity Analyst to join our team.

Responsibilities:

  • o Respond to security alarms and analyze and escalate incidents by process or management;
  • Maintain proficiency in information systems security, networking, infrastructure, and policy;
  • Recommend new capabilities and efforts to improve the effectiveness of the program;
  • o Monitoring and resolution of security incidents within established customer Service Level Agreements;
  • Employ effective web, email, and telephonic communications to clearly manage security incident response procedures;
  • Assist with security event monitoring, correlation, and daily event reporting within a tiered Security Operations Center;
  • Reviews system configurations to ensure compliance with security requirements and complies with established standards;
  • Manages user profiles in the Army Training and Certification Tracking System (ATCTS);
  • Interface with user community to understand their security needs and implements procedures to accommodate them;
  • Write authorization and accreditation (A&A) documentation and ensure the systems are operated and maintained in accordance with these security plans;
  • Provides reports to internal and external customers in response to queries and requests for computer security information;
  • Support security planning, assessment, risk analysis, and risk management for client systems and programs;
  • Perform Army Portfolio Management System (APMS) package management for AMRDEC Information Systems;
  • Consults on tasks, provides leadership and guidance for others;
  • Apply knowledge of IA policy, procedures, and workforce structure to implement secure networking, computing, and enclave environments.

Requirements:

  • HS Diploma or GED;
  • Top Secret Clearance;
  • Top class SIEM tools and ticking system;
  • Vulnerability Scanning;
  • DDOS;
  • Assist with security event monitoring, correlation, and daily event reporting within a tiered Security Operations Center;
  • Mobile Threats;
  • o Hands on experience with analyzing attack vectors such as;
  • o Working knowledge of Windows or Linux systems;
  • Log Analysis;
  • Support security planning, assessment, risk analysis, and risk management for client systems and programs;
  • Write authorization and accreditation (A&A) documentation and ensure the systems are operated and maintained in accordance with these security plans;
  • Interface with user community to understand their security needs and implements procedures to accommodate them;
  • DoD 8570-compliant Certification (COMPTIA Security+);
  • Apply knowledge of IA policy, procedures, and workforce structure to implement secure networking, computing, and enclave environments.