Tyto is searching for a Cybersecurity Analyst Level III for a complex, multi-year contract to support the Air Force Reserve Command (AFRC) Information Technology (IT) Services...
Responsibilities:
Demonstrates knowledge of system security.
Possesses familiarity with cyber threats, malicious cyber threat actor motivations, and working knowledge of threat analysis and enterprise level cyber threat mitigation strategies
Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems.
Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use.
Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses. Performs forensic analysis of information systems and portable devices, and forensic recovery of data using assessment tools.
Defines plans; organizes designs; and develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats.
Reviews, develops, and delivers cybersecurity awareness training.
Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches.
Requirements:
Recommend 5 years of experience
Knowledge of the limitations and capabilities of computer systems and technology; operational support of networks, operating systems, Internet technologies, databases, and security infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; and incident response program practices and procedures.
Skill in the use of a computer and applicable software; and in the configuring, deploying, and monitoring security infrastructure.
Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; to communicate effectively; and to supervise the work of others.
Complete DoD RMF Course within one hundred eighty (180) calendar days of being assigned to position
IAM Level II
Security Clearance Required:
Active DoD Secret clearance
Travel Required:
Minimal, less than 10%
Potential for Telework:
Based on customer needs
Equal Opportunity Employer: Disability/Veteran
About Tyto Athene
Tyto is an IT services and solutions company that provides mission-focused digital transformation to enhance the client experience and enable them to achieve desired outcomes. Tyto's services and solutions embody its domain expertise in four major Technology domains: Network Modernization, Hybrid Cloud, Cyber Security, and Enterprise IT. Tyto offers a broad range of service delivery models including design/install projects, Managed Services, and 'As-a-Service'. With over fifty years of experience, Tyto supports Defense, Intelligence, Space, National Security, Civilian, Health and Public Safety clients across the United States and around the globe.
Requirements:
After several strategic acquisitions in 2021, Tyto Athene has experienced enormous opportunity and growth. Aside from being the leading provider of mission-focused IT and Cyber services and solutions to critical U.S. government agencies, Tyto is well-positioned to meet the growing demand for network modernization requirements across the federal enterprise.
Our employees are the key to the innovation that has made Tyto a success. We provide an environment that is geared to reward potential, innovation, and teamwork. If you would like to unleash your creativity and your career - it's time to join Team Tyto
benefits
Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives We offer competitive benefits and learning and development opportunities
responsibilities
Demonstrates knowledge of system security Possesses familiarity with cyber threats, malicious cyber threat actor motivations, and working knowledge of threat analysis and enterprise level cyber threat mitigation strategies Monitors and analyzes cybersecurity alerts from cybersecurity tools, network devices, and information systems Monitors and maintains cybersecurity infrastructure and/or policies and procedures to protect information systems from unauthorized use Performs vulnerability scans of networks and applications to assess effectiveness and identify weaknesses Performs forensic analysis of information systems and portable devices, and forensic recovery of data using assessment tools Defines plans; organizes designs; and develops, modifies, tests, and integrates database or computer hardware systems to protect against cyber threats Reviews, develops, and delivers cybersecurity awareness training Researches and implements new security risk and mitigation strategies, tools, techniques, and solutions for the prevention, detection, containment, and correction of data security breaches
qualifications
Recommend 5 years of experience Knowledge of the limitations and capabilities of computer systems and technology; operational support of networks, operating systems, Internet technologies, databases, and security infrastructure; cybersecurity and information security controls, practices, procedures, and regulations; and incident response program practices and procedures Skill in the use of a computer and applicable software; and in the configuring, deploying, and monitoring security infrastructure Ability to resolve complex security issues in diverse and decentralized environments; to plan, develop, monitor, and maintain cybersecurity and information technology security processes and controls; to communicate effectively; and to supervise the work of others Complete DoD RMF Course within one hundred eighty (180) calendar days of being assigned to position Active DoD Secret clearance
Cookies & PrivacyWe do care about your privacy. we use cookies to give you the best experience of our website and our platform. By browsing and using our services on your browser, mobile app and any service is related to us you agree to our use of cookies.
Accept itMore information