Markesman Group is looking for a Cyberspace Defensive Analyst to join our team at Ft. Meade, Maryland. As a Cyberspace Defensive Analyst, you will analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. You will perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations.
Qualifications
- Bachelor's Degree in Information Systems Management, Computer Science, or related discipline (Additional four (4) years of job related experience may be substituted for education requirement).
- DOD 8140/DOD 8570 IAM Level III Certification.
- TS/SCI w/ CI Poly.
Preferred Requirements
- Minimum of five (5) years of experience in developing recommendations and COAs to solve complex cybersecurity problems to include:
- Coordinating network defense operations with DOD Component Commands / Services / Agencies / Field Activities or Intelligence Agencies or Law Enforcement or U.S. Government organizations.
- Performing research and analysis of cybersecurity capabilities to satisfy data protection requirements.
- Demonstrating expertise on the lifecycle of the network threats, attack vectors and methods of exploitation, the utilization, configuration, and implementation of industry capabilities including web content filters, email security capabilities, Intrusion Detection System, Intrusion Prevention System Security Event and Incident Management, Domain Name System security practices, advanced log analysis, network monitoring, network proxies, firewalls, and Access Control Lists, malware analysis reports, and alerts regarding potential malicious activity.
- Coordination and support on cyber-related incidents and issues to include Malware Analysis Reports, Alerts regarding potential malicious activity, and Suspicious Contact Reports.
- Identifying and developing solutions, methods, and guidance for securing U.S. interests in cyberspace and developing white papers, reports, and presentations addressing these solutions
- Identifying and drafting mitigation strategies for network boundary vulnerabilities, to enable the security and integrity of interests in cyberspace.
- Engaging with FCC or DIB on network protection.
- Developing Memorandums of Understanding / Memorandums of Agreement.