Get more qualified candidates and reduce your costs with our guaranteed recruiting solutions

Talk to an expert today

1148- Cybersecurity - Network Analysis

Chantilly, Virginia
TS/SCI Full Scope Polygraph


Cybersecurity Analyst will conduct network analysis and network threat analysis of metadata derived from the network.


  • Working knowledge of Customer's mission and other stakeholder's missions
  • Possess in-depth knowledge of analytical/methodological tools and approaches
  • Possess ability to effectively communicate with technical and non-technical colleagues at all levels
  • Process oriented, conceptually driven, and possess the ability to work collaboratively in a highly technical setting
  • Proven ability to multi-task; self-starter
  • Demonstrated on-the-job experience exhibiting oral and written communication skills to include giving briefings/presentation, reviewing/revising work authored by others, planning and facilitating meetings and providing support for technical documentation
  • Critical thinking skills sufficient to make sound and timely recommendations and/or decisions in unique situations, considering alternate actions
  • Analyze data related to the detection of malicious activity. Such support will include analysis of security architectures and controls, operational analysis of information technology security metadata, and long-term trend analysis of IT security metadata
  • Perform comprehensive analysis of all available system security metadata to identify specific patters of activity. Analyst detects, analyses and recommends mitigations to cyber threats to the networks.
  • Perform forensic analysis of malicious software
  • Analyze all network meta data (including but not limited to including operating system logs, network forensics of packet capture data, firewall logs, server logs) for anomalous behavior and identify malicious activity
  • Write reports associated with analysis activities which may be provided to senior managers. Reports shall contain high-level executive summaries, as well as details technical analysis. Reports shall also use precise and concise language to convey the nature of anomalies, background of systems, analysis performed, impact of network activity, and recommendations for mitigations
  • Perform network analysis and research, identifying/correlating information from various data points across various networks and systems and shall also utilize data visualization tools and/or existing analytical processes to analyze data to support the creation of analytical products. These efforts are indirect support to systems security monitoring and indecent response management
  • Perform analysis by identifying threat activity or risk t customer data information based on the correlation of activities or the patterns of network activity within the context of the network configuration and the thread environment
  • Review threat activities by looking for possible intelligence information, and by identifying/correlating events and activities to reveal patterns
  • Lead System Vulnerability Analysis on infrastructure
  • Provide feedback and suggestions on how to improve systems that are currently deployed or under development
  • Identify new requirements for changes/additions to the architecture and the risks associated with these changes/additions. Identify risks and architectural change requirements to mitigate those risks for other organization elements
  • Identify methods to improve analytic capability and processes
  • Conduct analysis of network packet-capture data, identify malicious traffic, and differentiate the activities
  • Determine timeline of incidents and impact to systems
  • Develop methods of capturing trends in activities, and document baselines of normal activity on such systems
  • Provide advanced analysis to systems and provide threat reporting and command briefings
  • Apply a full range of methodological tools and approaches to gain a comprehensive understanding of complex analytic issues and incorporate insights and findings. In order to achieve the


  • 10 years of experience
  • Bachelor's Degree in a related field


  • Experience working in the IC


Active Top Secret/SCI with a Full-Scope Polygraph Security Clearance