Cyber Security Forensics Analyst

at Perspecta
Published February 22, 2019
Location McLean, VA
Category Default  
Job Type Full-time  

Description

Every day at Perspecta, we enable hundreds of thousands of people to take on our nation’s most important work.  We’re a company founded on a diverse set of capabilities and skills, bound together by a single promise: we never stop solving our nation’s most complex challenges.  Our team of engineers, analysts, developers, investigators, integrators and architects work tirelessly to create innovative solutions.  We continually push ourselves—to respond, to adapt, to go further.  To look ahead to the changing landscape and develop new and innovative ways to serve our customers.

Perspecta works with U.S. government customers in defense, intelligence, civilian, health care, and state and local markets. Our high-caliber employees are rewarded in many ways—not only through competitive salaries and benefits packages, but the opportunity to create a meaningful impact in jobs and on projects that matter. 

Perspecta’s talented and robust workforce—14,000 strong—stands ready to welcome you to the team. Let’s make an impact together.

Perspecta is an AA/EEO Employer - Minorities/Women/Veterans/Disabled and other protected categories


Responsibilities


The Cyber Security Analyst will assist with Cl investigative efforts, conduct network traffic analysis, support Cl and Security focused network architecture reviews, and assess data pertaining to network intrusions and/or cyber relate d attacks on Sponsor equities. Also responsible for analyzing of data on Operational Technologies to minimize risks. The Cyber Security Analysts will be part of the Sponsor's High Threat Analytics team. In this capacity, the Cyber Security Analysts will analyze, investigate and provide in-dept h synopses of Sponsor and various external customer projects and technical initiatives from all disciplines. Responsibilities include, but are not limited to the following:

  • Ability to provide in-depth holistic analysis by leveraging various data elements relating to security audit, computers logs, and physical security information. A thorough understanding of these data elements is required in order to identity, mitigate, and document anomalies.
  • Demonstrated ability to use various COTS and custom platforms to correlate security statistics to proactively identify what is baseline and what is anomalous activity. A willingness to investigate both major and minor anomalies and bring them to closure. Attention to detail is critical.
  • Ability to identify collection gaps which hamper day-to-day analytic processing and document these shortfalls.
  • Strong performer with a demonstrated ability to multi-task and technical writing skills
  • Adeptness to work independently, self-starter, solve hard issues to include thinking outside the box, and learn new tools, explore new data sets to garner a holistic understanding of the issue.