Cybersecurity Analyst Level III Type: Full-time Location: Georgia Status: published

description

Position Summary:

Tyto is searching for a Cybersecurity Analyst Level III for a complex, multi-year contract to support the Air Force Reserve Command (AFRC) Information Technology (IT) Services...

Responsibilities:

Demonstrates knowledge of system security.

Possesses familiarity with cyber threats, malicious cyber threat actor motivations, and working knowledge of threat analysis and enterprise level cyber threat mitigation strategies

Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.

Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.

Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses. Performs forensic analysis of information systems and portable devices, and forensic recovery of data using assessment tools.

Defines plans; organizes designs; and develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.

Reviews, develops, and delivers cybersecurity awareness training.

Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.

Requirements:

Recommend 5 years of experience

Knowledge of the limitations and capabilities of computer systems and technology; operational support of networks, operating systems, Internet technologies, databases, and security infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; and incident response program practices and procedures.

Skill in the use of a computer and applicable software; and in the configuring, deploying, and monitoring security infrastructure.

Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; to communicate effectively; and to supervise the work of others.

Complete DoD RMF Course within one hundred eighty (180) calendar days of being assigned to position

IAM Level II

Security Clearance Required:

Active DoD Secret clearance

Travel Required:

Minimal, less than 10%

Potential for Telework:

Based on customer needs

Equal Opportunity Employer: Disability/Veteran

About Tyto Athene

Tyto is an IT services and solutions company that provides mission-focused digital transformation to enhance the client experience and enable them to achieve desired outcomes. Tyto's services and solutions embody its domain expertise in four major Technology domains: Network Modernization, Hybrid Cloud, Cyber Security, and Enterprise IT. Tyto offers a broad range of service delivery models including design/install projects, Managed Services, and 'As-a-Service'. With over fifty years of experience, Tyto supports Defense, Intelligence, Space, National Security, Civilian, Health and Public Safety clients across the United States and around the globe.

Requirements:
After several strategic acquisitions in 2021, Tyto Athene has experienced enormous opportunity and growth. Aside from being the leading provider of mission-focused IT and Cyber services and solutions to critical U.S. government agencies, Tyto is well-positioned to meet the growing demand for network modernization requirements across the federal enterprise.

Our employees are the key to the innovation that has made Tyto a success. We provide an environment that is geared to reward potential, innovation, and teamwork. If you would like to unleash your creativity and your career - it's time to join Team Tyto

benefits

Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives
We offer competitive benefits and learning and development opportunities

responsibilities

Demonstrates knowledge of system security
Possesses familiarity with cyber threats, malicious cyber threat actor motivations, and working knowledge of threat analysis and enterprise level cyber threat mitigation strategies
Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems
Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use
Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses
Performs forensic analysis of information systems and portable devices, and forensic recovery of data using assessment tools
Defines plans; organizes designs; and develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats
Reviews, develops, and delivers cybersecurity awareness training
Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches

qualifications

Recommend 5 years of experience
Knowledge of the limitations and capabilities of computer systems and technology; operational support of networks, operating systems, Internet technologies, databases, and security infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; and incident response program practices and procedures
Skill in the use of a computer and applicable software; and in the configuring, deploying, and monitoring security infrastructure
Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; to communicate effectively; and to supervise the work of others
Complete DoD RMF Course within one hundred eighty (180) calendar days of being assigned to position
Active DoD Secret clearance
Cookies & PrivacyWe do care about your privacy. we use cookies to give you the best experience of our website and our platform. By browsing and using our services on your browser, mobile app and any service is related to us you agree to our use of cookies. Accept itMore information