Cyber Security Analyst III - 5th Shift

  • Location: VA Vienna - Headquarters
  • Full/Part Time: Full-Time
  • Regular/Temporary: Regular

Job Description

Share:

Employee Perks

Why You Will Love Being Part of the Navy Federal Team:

*Competitive compensation with opportunities for annual raises, promotions, and bonus potential
*Best-in-Class Benefits! (7% 401k match / Pension plan / Tuition reimbursement / Great insurance options)
*On-site amenities include fitness center, wellness center, cafeteria, etc. at Pensacola, FL; Vienna, VA and Winchester, VA campuses
*Consistently Awarded Top Workplace
*Nationally recognized training department by TRAINING Magazine
*An employee-focused, diverse, and service-oriented workplace environment

Basic Purpose


Please Note: Current shift opportunities include after hours and weekend support for the following shifts:

Hours: 6:00PM - 6:30AM,    Days:    Saturday – Sunday
Hours: 2:00PM - 10:30PM,  Days:    Monday – Tuesday


Provide advanced detection and troubleshooting support for the more complex, high impact escalated cyber events/incidents in a 24/7/365 Cyber Security Operations Center. Lead the analysis and response to critical threats and events in the day-to-day monitoring of NFCU’s global technology environment, and providing technical support.  Works under minimal supervision.

Responsibilities:

• Perform major analysis, response and remediation on cyber incidents; determines course of action in compliance with the appropriate operational level agreements
• Provide independent thinking and real time decision making to diagnose and analyze high severity  escalated incidents ensuring critical response and remediation
• Perform in-depth analysis, monitoring, research, assessment and recommendations on Intrusion detection and prevention tools, anomaly detection systems, firewalls, antivirus systems and proxy devices
• Develop content to implement countermeasures in response to potential or identified cyber threats and attacks based on incident response activities
• Provide log/network/malware/device analysis and make recommendations for remediation of security vulnerability conditions
• Leverage commercial and open source tools to quickly analyze, detect, and respond to cyber security incidents
• Develop and maintain documentation of more complex threats and incidents to enhance event monitoring and incident response function and cyber tools
• Develop internal documentation, such as detailed procedures, playbooks, and operational metrics reports
• Provide technical guidance and oversight to Tier 1/2 Staff
• Communicate shift turnover materials (e.g., ongoing incidents) to coworkers
• Execute daily adhoc tasks or lead small projects
• Perform other duties as assigned or appropriate

Qualifications:

• Bachelor Degree in business, information systems, or a related technical field or equivalent work experience
• Advanced knowledge of operating systems and networks
• Experience leading, guiding and mentoring others
• Experience with security architectures, devices, proxies, and firewalls
• Advanced  skill with Security Information and Event Management (SIEM) including the ability to create correlation content
• Experience in analyzing security logs generated by Intrusion Detection/Prevention Systems (IDS/IPS) is required
• Ability to identify gaps in security monitoring and drive process improvements
• Effective verbal and written communication skills
• Advanced research, analytical, and problem solving skills
• Effective skill presenting findings, conclusions, alternatives and information clearly and concisely
• Effective skill working with all levels of management, supervisors, stakeholders and vendors
• Advanced skill in learning new concepts and conducting triage of methodologies quickly
• Advanced skill in to collaborating with other teams on time sensitive incidents
• Desired: Experience in a SOC environment
• Desired: Effective skill in Forensic and Malware analysis
• Desired: Experience with Security Tools related to Enterprise Log Management, IDP/IDS, Antivirus, Firewalls, Proxies, DLP, Forensic Analysis and SIEM
• CISSP, CISA, CCSP or other related Information Security certifications
• Working knowledge of IT Security Standards and Frameworks including ISO and NIST

Competencies:
• Comfort Around Higher Management
• Dealing with Ambiguity
• Learning on the Fly
• Timely Decision Making
• Priority Setting
• Boss Relationships
• Understanding Others
• Self Development
• Intellectual Horsepower
• Action Oriented
• Composure
• Customer Focus
• Planning
• Decision Quality
• Functional/Technical Skills
• Drive for Results
• Time Management
• Written Communications
• Focusing on The Bottom Line
• Keeping on Point
• Procedures

Hours:
• Shift Work required
• Evenings and/or weekends Required
• Holidays required

Current shift opportunities include after hours and weekend support for the following shifts:

Hours: 6:00PM - 6:30AM,    Days:    Saturday – Sunday
Hours: 2:00PM - 10:30PM,  Days:    Monday – Tuesday

Equal Employment Opportunity

 

Navy Federal values, celebrates, and enacts diversity in the workplace.  Navy Federal takes affirmative action to employ and advance in employment qualified individuals with disabilities, disabled veterans, Armed Forces service medal veterans, recently separated veterans, and other protected veterans.  EOE/AA/M/F/Veteran/Disability