Tetrad Digital Integrity (TDI) is seeking a Computer Network Defender to support our client based in Manassas, VA.
Analyze raw data sources to extract, institutionalize, and document actionable events
Document the flow of data and identify multiple distinct data sources where suspicious behavior can be identified – must also be able to identify supplemental sources where similar data may be found
Investigate and identify the root cause behind security incidents – to include all stages of the cyber kill chain as appropriate
Communicate and collaborate with colleagues to investigate incidents
Investigate incidents both from a network and host/application level
Investigate an incident, develop/communicate a timeline, and identify multiple scenarios based on the investigation
Monitor, track and communicate reported events for numerous different security platforms, operating systems, databases, and management systems.
Perform regular continuous monitoring of events across platforms, operating systems, databases, and management systems.
Improve and implement indicators and protections across platforms, operating systems, databases, and management systems.
Generate reports on a scheduled basis to document findings and remediation efforts, to include recommendations to the system owners.
Work with the system owners to remediate security issues derived through external and internal assessments.
Develop processes to proactively address security risks and develop reporting dashboards in House security systems to continuously track progress.
Work in an Integrated Operations Center with other business units to assist in incidents on behalf of CyberSecurity
Bachelor’s degree in related field (i.e., Computer Science, Information Systems Management) and minimum of five (5) years of relevant IT security related work experience. In lieu of a Bachelor’s degree, proposed staff should have at least eight (8) years of IT security experience.
Demonstrated program level experience supporting network defense and strategies
Ability to work in a high-pressure environment with changing priorities
A solid understanding of current threats and tactics beingused to attack systems
Experience supporting the full lifecycle of indicators of compromise and signature process, to include development of security documentation
Ability to communicate effectively, both orally and in writing, with information technology professionals, and technical and non-technical users