Location: McLean, VA *Clearance: ActiveTS/SCI w/ Polygraph needed to apply *
Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.
Looking for a Cyber Watch analyst to support a 12-hour Day/Night Shift schedule on the Computer Incident Response Team (CIRT) Watch Floor:
Collaborate between CIRT elements as necessary during incident detection and response stages
Respond promptly to all request for support whether telephonic, via e-mail or instant messenger
Create releasable finished intelligence products and reports for the IC as well as IC Senior Leadership
Maintain incident case management database for all reported incidents
Analyze incidents and events captured in the Case Management Database for trends, patterns, or actionable information
Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness
Leverage existing business processes and document new repeatable business processes and procedures where necessary
Research external information on events, incidents, outages, threats, and technical vulnerabilities
Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team
Assess incidents to identify type of attack, collect evidence, and assess impact
Bachelor’s degree (or equivalent) in Cybersecurity, Information Security, IT, EE, Network Engineering, Computer Science, or related field. An additional 4 years of experience in a cyber security related area may be substituted for a degree. Experience used as college equivalency must be in addition to other experience requirements.
Minimum 1 year experience in three or more specific areas to include: analysis, network engineering, networking security, penetration testing, red teaming, hardware engineering, software reverse engineering, and computer exploitation.
Minimum 6 months experience working with a Security Incident and Event Management (SIEM) system. (e.g.: ArcSight, Splunk Enterprise Security)
Minimum 6 months experience working in a Security or Network Operations Center (SOC or NOC).
Ability to research and analyze data from a variety of sources and to present findings in clear, concise reports.
Prior Intelligence Community experience.
Windows or Linux experience
Any relevant security certification
Equal Opportunity Employment Cornerstone Defense is proud to be an Equal Opportunity Employer. We are committed to creating an inclusive working environment for all employees and to upholding diversity in our recruiting and hiring processes. All qualified applicants will receive equal consideration for employment without regard to sex, gender identity, sexual orientation, race, color, age, religion, national origin, physical or mental disability, protected Veteran status, or any other characteristic protected by law.