Network-based Systems Analyst Level I, II, III and IVother related Employment listings - Arlington, VA at Geebo

Network-based Systems Analyst Level I, II, III and IV

Hello, Greetings from Ampcus Inc.
Ampcus is a technology services consulting company.
Ampcus Inc.
is a Global leader in end-to-end IT Business Solutions and Services with latest technologies.
We are listed among the top 50 fastest growing companies in USA.
We work closely with our clients for Talent acquisition.
We are looking for a Network-based Systems Analyst Level I, II, III and IV at NOVA (Norther Virginia).
Your resume is a very good match for this opportunity, please review the job description below and please let us know if you are interested and available.
Role Network-based Systems Analyst Level I, II, III and IV Location NOVA (Norther Virginia) Duration 12
months assignment (Possible extension) Job Description Core Competencies Knowledge of Computer Network Defense policies, procedures, and regulations Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources Identify and analyze anomalies in network traffic using metadata Reconstruct a malicious attack or activity based on network traffic Examine network topologies to understand data flows through the network Knowledge of network device integrity concepts and methodologies Skill in preserving evidence integrity according to standard operating procedures or national standards Level I (Minimum 3 years network investigations experience with a High school diploma or a Bachelorrsquos degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with a minimum 1 year of network investigations experience) Proficiency at level II includes all core competencies in addition to the following Monitor external data sources to maintain currency of Computer Network Defense threat conditions Perform analysis of log files from a variety of sources (eg, network traffic logs, firewall logs, intrusion detection system logs, DNS logs) to identify possible threats to network security Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts Track and document Computer Network Defense incidents from initial detection through final resolution Level II (4-6 years network investigations experience with a High school diploma or a Bachelorrsquos degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with 2-4 years of network investigations experience) Proficiency at level II includes all skills defined at level I in addition to the following Collect network intrusion artifacts (eg, domains, URIrsquos, certificates, etc.
) and use discovered data to enable mitigation of potential Computer Network Defense incidents.
Analyze identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information Collect network device integrity data and analyze for signs of tampering or compromise Assist with real-time CND incident handling (ie, forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements Level III (7-9 years network investigations experience with a High school diploma or a Bachelorrsquos degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with 5-7 years of network investigations experience) Proficiency level III includes all skills defined at level II in addition to the following Assist the Government lead in coordinating teams in preliminary incident response investigations Assist the Government lead with interfacing with the customer while onsite Determines appropriate courses of actions in response to identified and analyzed anomalous network activity Assess network topology and device configurations identifying critical security concerns and providing security best practice recommendations Assist with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies Serves as technical expert and liaison to intra-organizational components and leadership Level IV (10
years network investigations experience with a High school diploma or a Bachelorrsquos degree in a technical discipline from an accredited college or university in Computer Science, Cybersecurity, Computer Engineering, or related discipline, and with 8
years of network investigations experience) Proficiency at level IV includes all skills defined at level III in addition to the following Assist the Government lead in performing command and control functions in response to incidents Coordinate with and provide expert technical support to enterprise-wide Computer Network Defense technicians with respect to resolving incidents Serve as technical expert and liaison to the intelligence community (IC) and law enforcement personnel explaining incident details as required Conducts peer reviews and supports quality assurance activities for junior personnel Supports with overseeing technical analysis and mentoringproviding guidance to others on data collection, analysis and reporting in support of onsite engagements Regards, Ashwin Kajale Sr.
Manager ndash Talent Acquisition CRM Ampcus Inc.
14900 Conference Center Dr, Suite 500, Chantilly, VA 20151 Email ID mailto www.
ampcus.
com httpswww.
ampcus.
com.
Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.