Today
Top Secret/SCI
Unspecified
Unspecified
john c. stennis space center, MS (On-Site/Office)
ManTech seeks a seek s a motivated, career and customer-oriented Mid-Level NOSC Analyst to join our team in Stennis, MS .
In this role you will provide daily management and oversight to a team of up to 40+ operators providing support for a network, cybersecurity and cloud operations and incident management on a 24x7x365 basis. You will provide advanced network monitoring, incident response, and system troubleshooting to ensure mission-critical IT infrastructure remains secure and operational. Analyze escalated issues, coordinate with cross-functional teams to resolve network and security incidents and support the implementation of cybersecurity measures in alignment with policies and standards.
Responsibilities include, but are not limited to:
Minimum Qualifications:
Preferred Qualifications:
Clearance Requirements:
Physical Requirements:
In this role you will provide daily management and oversight to a team of up to 40+ operators providing support for a network, cybersecurity and cloud operations and incident management on a 24x7x365 basis. You will provide advanced network monitoring, incident response, and system troubleshooting to ensure mission-critical IT infrastructure remains secure and operational. Analyze escalated issues, coordinate with cross-functional teams to resolve network and security incidents and support the implementation of cybersecurity measures in alignment with policies and standards.
Responsibilities include, but are not limited to:
- Provide support analyzing network traffic and various log data to determine the status and/or threat/impact against the network, recommending appropriate countermeasures , facilitating the tracking, handling, and reporting of all network and cyber security events and computer incidents.
- Monitor, detect, scan, record, audit, analyze, report, remedy, coordinate, and track network and cyber security related events for customer networks , infrastructure, and endpoints.
- Conduct forensic analysis and detailed investigations of security incidents to determine the root cause and extent of compromise resolve this issue, develop and implement lessons learned to improve support
- Document analysis, findings, and actions in a case/knowledge management system.
- Provide guidance and support to other team members , including coaching and knowledge sharing to enhance their technical skills
- Support senior-level NOSC personnel with the creation and distribution of incident reports
- Participate in vulnerability assessments and penetration testing activities to identify and address potential security weaknesses
Minimum Qualifications:
- 4 + four years of related experience with network and/or security operations to include, but not limited to, Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC ) or , Network Operations Center (NOC), Security Operations Center (SOC ) , or Network Operations Security Center (NOSC ) .
- A Bachelor of Science degree in Information Security, Computer Science, or related field and a minimum of (6) six months experience (or equivalent experience) in one or more of the following areas: network and infrastructure operations & maintenance (O&M), computer network penetration testing/techniques; computer evidence seizure, computer forensic analysis, data recovery; computer intrusion analysis/incident response, intrusion detection; computer network surveillance/monitoring; network protocols, network devices,
- Possess either a Certified Ethical Hacker (CEH) or a GIAC Certified Incident Handler (GCIH) and meet DoD 8570 and/or 8140 Level II or III as required by the government
- Experience with Incident Response; identifying , investigating, reporting and remediating
- Captures, protects, and retains digital forensic data and information maintaining proper legal chain of custody for legal and law enforcement activities
- Hands on experience with network monitoring and troubleshooting tools ( i.e Splunk, HBSS, Nessus , etc.), r esearches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption
- Proficiency in security incident response methodologies and best practices , f amiliarity with scripting languages (Python, PowerShell, etc.) for automation and data analysis , and an u nderstanding of cloud platforms and their impact on SOC operations (e.g., AWS, Azure, GCP) .
Preferred Qualifications:
- Possess one or more of the following certifications: DOD 8570 Industry Related Certification - CSSP Analyst, CSSP Infrastructure Support or CSSP Incident Responder, Penetration Testing, GIAC Certified Forensic Examiner (GCFE), GIAC Advanced Smartphone Forensics Certification (GASF)
Clearance Requirements:
- Must have a current/active Top Secret/SCI clearance.
- The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.
Physical Requirements:
- Must be able to work in an office environment and maneuver in data center and other IT equipment installation locations.
- Constantly operate a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- Ability to lift and carry 75 lbs for distances up to 50 feet.
group id: RTX14564a
ManTech Corporate Capabilities