More jobs:
Junior Security Analyst Security Clearance
Job in
Herndon, Fairfax County, Virginia, 20170, USA
Listed on 2025-12-22
Listing for:
DirectViz, LLC
Full Time
position Listed on 2025-12-22
Job specializations:
-
IT/Tech
Cybersecurity, Network Security, Security Manager
Job Description & How to Apply Below
Direct Viz Solutions (DVS) is a dynamic and rapidly growing government contractor committed to delivering innovative IT solutions that address the mission-critical needs of our government clients. Through the expertise and dedication of our talented team, we provide cutting-edge technology services designed to achieve success and exceed expectations. At DVS, we prioritize our employees as our greatest asset. We offer competitive compensation, comprehensive medical benefits, a 401(k) match, generous PTO accrual, professional development reimbursement, corporate-funded technology certifications, and robust employee recognition and appreciation programs.
Title:
Junior Security Analyst
Location:
Herndon, VA Clearance:
Active Secret or higher. DVS is looking for a Junior Security Analyst to join our growing team. The work location is onsite in Herndon, VA. Must have an active Secret clearance.
Key Responsibilities
* Monitor and analyze security events and alerts reported by the TSA Security Information and Event Management (SIEM) system on a 24x7x365 basis.
* Identify and investigate suspicious or malicious activity and cyber events that violate TSA policy.
* Analyze logs and events from current and future device types that send data to the TSA Security Operations Center (SOC).
* Review non-traditional data feeds (e.g., Human Resources data, badging information, physical security devices) integrated into the SIEM architecture.
* Document all findings and additional information collected during each security investigation.
* Record all relevant artifacts (e.g., emails, logs, documents, URLs, screenshots) associated with security events and incidents in the TSA SOC incident tracking system. To support the 24x7x365 requirements of cyber operations there are four (2) available shift schedules:
* Shift 1 - Sun, Mon, Tue - 6 PM to 6 AM
* Shift 2 - Thu, Fri, Sat - 6 PM to 6 AM The shifts will rotate personnel every other Wed to work 8 hours which will equal 80 hours over 2 weeks.
Required Qualifications:
Education:
High School degree.
Experience:
* 1 to 3 years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
* Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.
* Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
* Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:
Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host-based Intrusion Detection System/ Host-based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco Net Flow), Virtual Private Network (VPN) gateways/concentrators, server event logs, e-mail and host anti-virus, desktop security monitoring agents, anti-virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.)
* Clearance Requirements:
Secret or higher. Preferred
Skills:
* Certification:
Security+, GIAC Security Essentials (GSEC) or equivalent certification is desired
* Experience with Splunk query language
* Experience with IDS/IPS/firewall/security configurations and signature development
* Experience with PCAP analysis
* Experience with Tanium threat response
* Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities that are present within a computer system and/or enterprise network
* Experience working with a ticket management system to collect, document and maintain information pertinent to security investigations and incidents
* Excellent verbal and written communications skills and ability produce clear and thorough security incident reports and briefings
* Experience in monitoring the operational status of monitoring components and escalating and reporting outages of the components
* Conceptual understanding of Windows Active Directory is also desired
* Experience working with various event logging systems and must be proficient in the review of security event log analysis. Previous experience with SIEM platforms that perform log collection, analysis, correlation, and alerting is also preferred
* Experience with the identification and implementation of counter-measures or mitigating…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
Search for further Jobs Here:
×