Vacancy expired!
Longeviti LLC is searching for a Computer Forensic and Intrusion Analyst (Entry Level). Longeviti is a government contractor specializing in providing professional support services in fields of information technology, program management, agency administration, intelligence analysis, language translation, culture immersion, and serving as opposing forces/role players. We are a certified 8(a) and small disadvantaged business that excels in the market having earned our status as an ISO 9001 certified provider of services and are rated as CMMI Level 3 in both Development and Services. Quality and continuous improvement are basic tenets of the organization and giving our staff the tools to make it happen are a trademark. Customer satisfaction is paramount.
Longeviti seeks a Computer Forensic and Intrusion Analyst (Entry Level) to provide mission support to the Department of Defense Cyber Crime Center (DC3). This position will be with the Analytics Division of the Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE). DCISE is the operational hub for DoD’s Defense Industrial Base (DIB) Cybersecurity Program, focused on protecting intellectual property and safeguarding DoD content residing on or transiting contractor unclassified networks. DCISE develops and shares actionable threat products, performs cyber analysis and diagnostics, and provides remediation consults for DIB partners. SECURITY CLEARANCE:- Must have an active Secret security clearance. Only candidates with a current Secret clearance will be considered.
- Due to federal security clearance requirements, applicant must be a United States Citizen.
- Support the Analytics Division (AD). AD conducts cyber analysis on information submitted by DIB Partners, the DoD and other USG-related reporting to provide a complete understanding of known or potential threats to unclassified DoD information on or transiting DIB systems and networks
- Support the Tactical Operations Branch that daily functions are related to processing of voluntary and mandatory incident reports as well as Malware Analysis, Customer Response Form (CRF), CRF Supplements, and Partner Engagement
- Responsible for processing and analyzing indicator of compromise (IOC) based incident reports, coupled with data enrichment via OSINT, and creating the CRF threat product for our Partners and USG Stakeholders
- An understanding of nation-state cyber activity
- Familiarity with indicators of compromise
- Ability to perform data analysis, aggregation, event correlation
- Very high attention to detail and desire to learn and contribute
- Certifications (any): GCIH, Network+, Security+, A+, etc.
- Technical Skills proficiency: encryption technologies/standards, basic malware analysis or digital computer forensics study or experience
- Applies fundamental concepts, processes, practices, and procedures on technical assignments. Performs work that requires practical experience and training. Work is performed under supervision.
- 8 years of professional experience without a degree; or Bachelor’s degree from an accredited college in a related discipline, or equivalent experience/combined education.