Overview
Analyze and correlate anomalous events identified in Intrusion Detection System (IDS), Intrusion Prevention System
(IPS), Security Information and Event Management (SIEM) systems, and supporting devices/applications. These devices,
applications. tools, data include, but are not li mited to the following: ArcSight SIEM (or similar capability), JIMS (Joint
incid ent Management System), HBSS (Host Based Security Systems), TCP (Transmission Control Protocol) Dump,
Attack, Sensing, & Warning Sensors (Snort, Full Packet Capture (PCAP), Flow data, Pipeline and Super Mediator),
McAfee Intrushield IPS, Router and firewall logs, Syslog data, Web Proxy / Reverse Proxy logs, SPLUNK, Big Data
Platforms, NIKSUM and Cyber analytics applications and Netflow Data.
Responsibilities
MAJOR JOB ACTIVITIES:
Analyze, correlate and trend anomalous events and incidents to identify and characterize the threat or incident in such a manner that will:
network configuration changes in order to (IOT) deter the existing threat;
Qualifications
MINIMUM QUALIFICATIONS:
TS/SCI security clearance required
Bachelor's Degree in a related field, preferred.
Operating System Certifications: SNORT IDPS/IPS Training Certificate based on current market offerings.
Training IAW PWS Requirements: IA Awareness Training, as specified in AR 25-2; Antiterroism Level I; iWATCH; Level I
OPSEC; TARP Training; Theater Specific Training, if applicable
CSSP-A (CEH, CFR, CSA+, GCIA, GCIH, GICSP, SCYBER)
EXPERIENCE:
Knowledge and minimum 4 years of experience in Information Assurance Systems/Network Analysis
Experience with Network intrusion detection system (NIDS) software such as SNORT
Experience with Army Cyber Security (CS) guidance and regulations.
EEO Statement
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This
commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage
differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity/
Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race,
age, color, religion, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/
Female/Disabled/Veteran.
MINIMUM QUALIFICATIONS:
TS/SCI security clearance required
Bachelor's Degree in a related field, preferred.
Operating System Certifications: SNORT IDPS/IPS Training Certificate based on current market offerings.
Training IAW PWS Requirements: IA Awareness Training, as specified in AR 25-2; Antiterroism Level I; iWATCH; Level I
OPSEC; TARP Training; Theater Specific Training, if applicable
CSSP-A (CEH, CFR, CSA+, GCIA, GCIH, GICSP, SCYBER)
EXPERIENCE:
Knowledge and minimum 4 years of experience in Information Assurance Systems/Network Analysis
Experience with Network intrusion detection system (NIDS) software such as SNORT
Experience with Army Cyber Security (CS) guidance and regulations.
EEO Statement
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This
commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage
differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity/
Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race,
age, color, religion, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/
Female/Disabled/Veteran.
MAJOR JOB ACTIVITIES:
Analyze, correlate and trend anomalous events and incidents to identify and characterize the threat or incident in such a manner that will:
network configuration changes in order to (IOT) deter the existing threat;