Cyber Incident Responder/CSSP (Top Secret / Sensitive Compartmented Information (TS/SCI) Security Clearance is Required)

****** Work location for these positions are Schriever AFB, Colorado Springs, CO ***********

Requirements:
  • Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 
  • Appropriate CSSP certification per DoD 8570.01-M for CSSP Analyst and CSSP Incident Respondercategories.
  • Bachelors Degree in Computer Science or a related technical discipline, or the equivalent combination of education, professional training or work experience. 
  • Appropriate CSSP certification per DoD 8570.01-M for CSSP Analyst and CSSP Incident Responder categories.

Duties:
Conducts 24/7 Defensive Cyberspace Operations (DCO) support activities on Geosynchronous Space Situational Awareness Program (GSSAP) mission system or Military Satellite Communications (MILSATCOM) mission systems. Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction. Typical tasks include perform monitoring operations; report cyber security events and anomalies; provide analysis and recommendations, Vulnerability Management (VM) and Malware Protection / Vulnerability Assessment and Analysis (VAA), Intrusion Analysis and Correlation Information, incident handling, mission operations transfer, exercise and assessment support.
 
Other Tasks may include;
1. Performs Computer Security Incident Response activities for a large organization, coordinates with other government agencies to record and report incidents.
2. Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
3. Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information.
4. Evaluate firewall change requests and assess organizational risk.
5. Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications and operating systems.
6. Assists with implementation of counter-measures or mitigating controls.
7. Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
8. Performs periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance.
9. Prepares incident reports of analysis methodology and results.
10. Maintains current knowledge of relevant technology as assigned.
11. Participates in special projects as required.

Want to apply later?

Type your email address below to receive a reminder

ErrorRequired field

Apply to Job

ErrorRequired field
ErrorRequired field
ErrorRequired field
Error
Error
insert_drive_file
insert_drive_file