×
Register Here to Apply for Jobs or Post Jobs. X

Cyber Defense Analyst Security Clearance

Job in Pearl Harbor, Honolulu County, Hawaii, USA
Listing for: TEKsystems c/o Allegis Group
Per diem position
Listed on 2025-12-06
Job specializations:
  • IT/Tech
    Cybersecurity, Network Security
Job Description & How to Apply Below
Position: Cyber Defense Analyst with Security Clearance
Location: Pearl Harbor
Work closely with Government counterparts to provide guidance within the CND-SP area. Provide CND reports, trends, responses, mitigations, analysis & information dissemination. Provide C2 support, situational awareness support, and provide leadership & support for all CND applicable activities within Protect, Detect, Respond, and Sustain. Work as a technical leader within the CSSP Team, responsible for maintaining the integrity & security of enterprise-wide systems & networks.

Provide technical leadership to CND Teams supporting security initiatives through predictive & reactive analysis, and by articulating emerging trends to leadership & staff.

PRIMARY RESPONSIBILITIES:

• Perform computer network incident detection, and response activities to detect, correlate, identify and characterize anomalous activity that may be indicative of threats to the enterprise.

• Monitor various security tools and applications for possible malicious activities, investigate any associated alerts or indicators, and develop recommendations for a course of action, including mitigation strategies as necessary.

• Conduct analysis of low-level (“low and slow”) events to identify unauthorized activity utilizing exploratory problem-solving or self-learning techniques.

• Conduct near real-time event triage and analysis, which can result in network traffic validations or a Mission Partner’s incident report.

• Utilize formal monitoring policies and procedures that include the appropriate use of DoD-approved network monitoring and traffic analysis tools to assist with identifying suspicious, anomalous, or overtly malicious network traffic on a 24/7/365 basis.

• Review and analyze available logs in a timely manner to detect intruders and notify Mission Partners of activity through a formal reporting process/pending an incident report.

• Apply, develop, tune, and distribute or optimize new and existing countermeasures or guidance to prevent or mitigate potential cyber event impacts when possible.

• Perform network traffic analysis utilizing raw packet data, net flow, IDS, IPS and custom sensor output, as it pertains to the cyber security of communications networks.

• Understand attack signatures, tactics, techniques, and procedures associated with advanced threats.

• Requires good technical writing skills as each event, including the associated analysis, are documented in a ticketing system for review and action.

• Requires excellent communication skills as we are collocated with our customer and regular face-to-face interaction is necessary throughout the day, as well as significant coordination and communication between team members.

BASIC QUALIFICATIONS:

• Minimum active DoD Secret clearance with ability to obtain Top Secret (active TS strongly preferred)

• Current DoD 8570 IAT Level II Certification (e.g. Sec+ CE) or higher at time of start.

• Ability to obtain DoD 8570 CSSP-Analyst certification, such as CEH, CySA+, GCIA or equivalent, within 180 days of hire.

• Bachelor's and 2+ years of relevant experience; additional relevant work experience and/or military service may be considered in lieu of degree

• Experience working CND duties (e.g., Protect, Defend, Respond, and Sustain).

• Experience working with DoD / Government Leaders at all levels.

• Strong computing system knowledge, particularly networking, including a knowledge of communication protocols and familiarity with common computing security elements such as IDS/IPS systems and firewalls.

• Experience evaluating packet captures.

• Willingness and ability to perform shift work (shifts may not be static).

PREFERRED QUALIFICATIONS:

• Command Line Scripting skills (PERL, python, shell scripting) to automate analysis task.

• Knowledge of hacker tactics, techniques and procedures (TTP).

• Familiarity with computing security frameworks such as MITRE ATT&CK and Cyber Kill Chain.

• Monitoring of intrusion detection and computer defense appliances (Splunk, Elastic), applications, and analysis of associated alerts.

• Knowledge of advanced threat actor tactics, techniques, and procedures (TTP)

• Understanding of software exploits.

• Analyze packed and obfuscated code.
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary