Endpoint Security Analyst - TS/SCI clearance at Piper Companies
Fort Meade, MD 20755, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Dec, 25

Salary

0.0

Posted On

04 Sep, 25

Experience

8 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cnd, Cissp, Gcih, Gcia

Industry

Information Technology/IT

Description

Zachary Piper Solutions is seeking an Endpoint Security Analyst to provide network operations and cyber defense support to a DoD customer. A qualified candidate will provide holistic enterprise defensive strategies for Cloud, network boundaries, cross domains, and varying endpoint technologies. This position is fully onsite at Fort Meade, MD.

BASIC QUALIFICATIONS:

  • Active DoD TS/SCI clearance and eligible for C/I Polygraph
  • Bachelor’s degree in a related discipline with 8+ years of applicable combined education and experience; additional related years of experience is accepted in lieu of a degree.
  • IAT/IAM Level II OR III (Security +, CySA+, CND, CISSP, CASP+, GCIA, GCIH, GCFA, CEH)
  • Familiarity with all related aspects of cybersecurity operations and security architecture
  • In-depth knowledge of (1) network and application protocols, (2) cyber vulnerabilities and exploitation techniques and (3) cyber threat/adversary methodologies (TTPs).
Responsibilities
  • Provide analysis of architectures, technologies, DOD policy & information and critical data
  • Develop cybersecurity and risk assessment methodologies and procedures to support prevention, detection, and mitigation of anomalous activity, vulnerabilities and inefficiencies.
  • Prepare and perform briefings appropriate for senior leadership (i.e., general officer or flag officer)
  • Conduct analysis of enterprise cybersecurity defensive strategies in order to enable operational effectives, defense, and command and control.
  • Analyze network infrastructure in order to recommend methods and strategies that reduce and/or manage adverse impacts.
  • Develop standards, metrics and measures to support assessments, process improvements and operational efficiencies across the DODIN.
  • Expert understanding of various technologies and cybersecurity areas of interest including but not limited to:
  • Boundary Security: Identify, discover, and maintain cognizance of the DODIN boundary, inclusive of IAPs, peering points, and other major points of ingress/egress to the DODIN; Document and maintain boundary architectures, understand employed defensive capabilities and available sensor data.
  • Endpoint Security: Perform analysis, to include planning, assessing, and/or providing enterprise strategies for compliance and integration strategies with mid-tier, and boundary capabilities.
  • Cloud Security: Develop strategies to monitor, detect, and prevent unauthorized manipulation and access of cloud services.
Loading...