Tier 2 Security Analyst at SAIC
, , -
Full Time


Start Date

Immediate

Expiry Date

30 Jan, 26

Salary

0.0

Posted On

01 Nov, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cybersecurity, Digital Forensics, Red-Teaming, Ethical Hacking, Cloud Security, Malware Analysis, Enterprise Architecture, Technical Documentation, Vulnerability Management, Security Policies, IT Security Strategy, Technical Reporting, Application Migration, Data Migration, Network Security, CJIS Clearance

Industry

Defense and Space Manufacturing

Description
Science Applications International Corporation (SAIC) is seeking a Tier 2 Security Analyst to join our team supporting a major state & local government customer. This position reports to the SOC Manager/Tier 3. This role is 100%25 remote within the US! Essential duties of this position include: Performs Strategic Planning & Management and Digital Forensics from the National Initiative for Cybersecurity Education (NICE) Framework. Engages in specialized cybersecurity functions such as red-teaming, ethical hacking, cloud security architecture, digital forensics, reverse engineering of malware, and enterprise cyber architecture. Provides consultative and advanced, specialized, and/or highly independent functions not typically covered in other job sub-families. Provides specific, detailed information for hardware and software selection, cloud service provider selection (including SLA authorship, development, assessment). Implements application and data migration techniques and tools to meet business needs, including present and future capacity and security requirements. Addresses a wide range of security issues including architectures, firewalls, electronic data traffic, and network access. Researches, evaluates, and recommends new security tools, techniques, and technologies, and integrates them into the enterprise in alignment with IT security strategy. Utilizes COTS/GOTS and custom tools to scan, identify, contain, mitigate, and remediate vulnerabilities and intrusions in physical security and cybersecurity systems, processes, policies, etc. Applies expert engineering knowledge of enterprise IT and security solutions to design, develop, and/or implement consistent solutions with enterprise architecture security policies. Supports full-spectrum military cyberspace operations. Writes technical reports detailing assessments, mitigating, and remediating activities performed. Translates and authors technical documentation in layman's terms to ensure understanding of the work performed and its outcomes. Required Education and Qualifications: BS Degree and five (5) years or more experience; Masters and three (3) years or more experience; PhD and 0 years related experience. 4+ years of additional experience can be substituted in lieu of degree. Receives assignments in the form of objectives with goals and the process to meet those goals. Provides direction to employees according to established policies and management guidance. Administers company policies that directly affect subordinate employees and recommends changes to unit or sub-unit policies. Work is reviewed to measure meeting objectives. Candidates must be able to pass a CJIS Criminal Justice background investigation and maintain CJIS clearance throughout employment term. Citizenship Required Required Experience: Administering and executing policies, processes, and procedures affecting subordinate employees and the workflow of the work unit. Leading daily operations of the work unit. Making decisions that impact work unit operations, with erroneous decisions potentially causing delays in schedules and requiring additional people and financial resources. Security+ or higher certifications. Preferred Experience: ITIL v4 certification preferred (Foundation or above). Interacting internally primarily with subordinates and other supervisors, and externally with suppliers, vendors, and/or customers. Ensuring that the primary purpose of liaison is information sharing and basic problem resolution. Work is reviewed for soundness of judgment and overall quality and efficiency.
Responsibilities
The Tier 2 Security Analyst performs strategic planning and management, engaging in specialized cybersecurity functions. They provide consultative and advanced functions, addressing a wide range of security issues and implementing security tools and techniques.
Loading...