BE CHALLENGED AND MAKE A DIFFERENCE
In a world of technology, people make the difference. We believe if we invest in great people, then great things will happen. At AnaVation, we provide unmatched value to our customers and employees through innovative solutions and an engaging culture.
DESCRIPTION OF TASK TO BE PERFORMED:
Come join our growing team and make a difference every day! AnaVation is seeking an experienced Incident Response/Security Analyst to support a mission-critical cybersecurity in Washington DC.
REQUIRED QUALIFICATIONS:
- Education: Bachelor’s degree in Cybersecurity, Information Technology, or a related field. In lieu of a degree, a minimum of eight (8) years of hands-on relevant experience is required.
- Experience: 4 years
- Required Skills/Certs:
- Bachelor’s degree in a related field or equivalent demonstrated experience and knowledge.
- 4 years’ experience as a Security/Network Administrator.
- Hands-on experience conducting incident response activities and vulnerability analysis of various systems, applications, security tools, databases, and networks logs.
- Performing vulnerability scans with tools such as Nessus.
- Experience with Crowdstrike, TenableSC, Splunk. (Experience with comparable tools may be considered).
- Experience with NIST SP 800-61 rev2 Computer Security Incident Handling Guide.
- Excellent oral and written communication skills.
- Familiarity with multi-tiered network applications, common ports and protocols used in those communications, the Common Vulnerability System (CVS) and the exploitation mechanisms of common vulnerability types (e.g., buffer overflows, cross-site-scripting, SQL injection).
- Ability to perform online research and comprehend attack signatures while comparing them to network traffic to perform proper analysis of detections.
- Ability to use common tools such as Wireshark to examine network traffic.
- Certifications: Security + required
PREFERRED QUALIFICATIONS:
- Self-Starter – ability to quickly become competent with new security-related tools and processes.
- Ability to conduct Deep Dive analysis to determine root cause assessment of various network scanning agents’ scanning or communication failures.
- Ability to coordinate remediation strategies with agency’s department technical staff through completion.
- Familiarity with the various use cases and alignment of data from each tool to various security disciplines in configuration management, vulnerability management, risk management and incident management.
- Familiarity with encryption technologies used in commercial operating systems, including Public Key Infrastructures, symmetric and asymmetric cryptography, certificate trust stores and the use of key escrow for discovery and legal purpose.
- Familiarity with the use of Transport Layer Security (TLS) to secure network communications, code signing certificates and Certificate Authorities (CA) for the administration of encryption trust certificates.
- Familiarity with protocols commonly used in commercial networks, such as Server Message Block (SMB), Remote Procedure Calls (RPC), Hypertext Transfer Protocol (HTTP) and Structured Query Language (SQL).
- Understanding of the role of interactive training such as phishing exercises for assessment of organizational abilities.
- Familiarity with the use of data analysis tools, including the use of Microsoft Excel or PowerBI to combine data from multiple sources.
- The ability to deliver in-person or virtual training that results in excellent assessment via trainee feedback.
- Familiarity with information security terminology and be able to develop or select technical training in the discipline of information security geared to an organization.
- Familiarity with data management and reporting of training data and statistics using common tools such as Microsoft Excel and Word.