Join a Winning Team! RISA20220808-OP028 Cyber Security Operations Specialist II - Cybersecurity Data Analysis Services – St. Louis, MO (NCW) Saint Louis, MO · Full time

Cyber Security Operations Specialist II - Cybersecurity Data Analysis Services – St. Louis, MO (NCW)

Description

Cyber Security Operations Specialist II - Cybersecurity Data Analysis Services – St. Louis, MO (NCW

 

Position ID: RISA20220808-OP028

                        

Number of Positions: 1

 

Company: Rolston Information Systems Assurance, LLC (RISA)

 

FSLA Classification: Exempt

 

Location: St. Louis, MO (NCW

 

Remote/Telework Authorized? No remote/telework is authorized. Work is performed 100% on site.

 

Anticipated Start Date: Immediate Job Opening

 

Required Security Clearance: Must already possess and be able to maintain an active DoD TS/SCI security clearance.

 

Must already have or have held SCI within the last 2 years.

 

Must have the ability to obtain and maintain a CI polygraph within 6 months of hire.

 

COVID Policy: As directed by Executive Order 14042, all current and newly hired employees are required to be fully vaccinated for COVID-19 and provide proof of vaccination, except where they are legally entitled to an exemption/accommodation. 

 

Description

The Cyber Security Operations Specialist II - Cybersecurity Data Analysis Services team member will provide Cybersecurity Operation Cell (CSOC) Tier 2 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 2 services includes malware and implant analysis, and forensic artifact handling and analysis. When a Cyber Incident Response Team (CIRT) is stood up, all teams in support of CSOC Tier 2 services will be under the direct control of, and take direction from, the Government CIRT Commander. While not in a period of incident response, the team will conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident.

 

Specific Responsibilities

 

Essential Functions

Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government


Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counter intelligence personnel as required to perform advanced investigation and triage of incidents

 

Collaborates with appropriate authorities in the production of security incident reports

 

Categorizes incidents and events

 

Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated

 

Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events

 

Coordinates with other contracts, organizations, activities, and services to ensure NGA recovers from an incident/event

 

Builds timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions

 

Documents actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed

 

Develops and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed

 

Develops, maintains, sustains, and when properly authorized by the Government executes custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events

 

Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis

 

Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services

 

Provides adversary attribution

 

Performs malware analysis and signature development

 

Provides input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report

 

Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander

 

Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems

 

Performs digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis

 

When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events

 

Develops, documents, and provides to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down

 

Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification

 

Qualifications

Be able to work independently and with minimal supervision

Be proactive in performing assigned job duties

Be an excellent communicator

Be a team player and facilitate a collaborative work environment

Required Certifications:

Must have DoDD 8140.01 and DoD 8570.01-M IAT Level II certification. (Note: A minimum of CompTIA Security+ CE is required as a pre-hire requirement.)

 

CSSP Analyst certification (Within 6 months of date of hire)

(Note: see below for which certifications qualify – You only require one of the certifications listed under CSSP Analyst, in addition to CompTIA Security+ CE.)

o  If applicant does not already have one of the following certifications, applicant will be allowed six months from job start date to obtain the certification.

CSSP Analyst

·      CEH

·      CFR

·      CCNA Cyber Ops

·      CCNA-Security

·      CySA+

·      GCIA

·      GCIH

·      GICSP

·      Cloud+

·      SCYBER

 

Required Education:

Bachelor’s Degree in a Technical field (i.e. Information Technology, Information Systems, Computer Science)

 

A minimum of 4 years of related work experience may be considered in lieu of a degree.

 

Required Experience/Skills:

See Essential Functions and Qualifications

 

Preferred Certifications:

DoDD 8140.01 and DoD 8570.01-M IAT Level III certification

 

Preferred Education:

N/A

 

Preferred Experience:

5+ years of related CSOC tier 2 or 3 work experience

 

Supervisory Responsibilities:

None

 

Work Environment:

Professional Office Environment; must be able to sit at a desktop or laptop computer for extended periods of time.

 

Physical Demands:

While performing the duties of this job, the employee is regularly required to sit, stand, talk, hear, and use hands and fingers to operate a computer and telephone.

 

Must be able to communicate regularly via telephone and verbally present information to employees, customers, and outside vendors.

 

Work Schedule/Expected Hours of Work:

40 hours per week (various shifts available and will be discussed during the interview process - you will be assigned one shift and shifts are not rotated)

 

The start and end times may vary a little from what is listed here.

 

Day Shift: 0600-1400

Mid Shift:  1400-2200

Eve Shift:  2200-0600

 

Other Duties:

This job description is not designed to cover or contain a comprehensive listing of activities, duties and responsibilities that are required of the employee. 

 

Other duties, responsibilities and activities may change or be assigned at any time with or without notice.

 

Travel

Travel Estimated: No travel is expected.

 

Allowances

N/A

 

Per Diem

Limited to per diem allowed in accordance with the Joint Travel Regulations/Federal Travel Regulations (JTR/FTR) for pre-approved travel if required.

 

Citizenship

United States Citizenship is required.

 

About RISA

 

RISA is an emerging technologies service provider focused on the continuity of network operations and elimination of risk to ensure the confidentiality, integrity, and availability of critical business processes and data. RISA seeks professionals who are excited by technical challenges and driven by the opportunity to use their knowledge, skills, and abilities in helping our customers meet mission requirements. Our success comes from the talent and commitment of our dedicated employees driven in providing valuable services to our customers. Come along for the journey and perhaps you can be part of our growth and success.

 

RISA offers a comprehensive benefits package that includes:

·      Medical, Dental, Vision

·      Company Paid Life Insurance & Disability

·      Retirement Savings Plan including both Pre-tax & Roth Contributions

·      401(k)

·      Paid Time Off (PTO)

·      11 Paid Federal Holidays

 

RISA is an Equal Opportunity Employer