Main characteristics
- Location
- Fort Meade, Maryland
- Company
- ManTech
- Industry
- IT & Telecoms
Job summary
Secure our Nation, Ignite your FutureManTech is a leading provider of technology solutions and services to U.S. defense, intelligence, and federal civilian agencies. With over 53 years of experience, we specialize in delivering comprehensive cyber, data collection and analytics, enterprise IT, systems engineering, and software application development solutions that support national and homeland security.
The Cybersecurity Network Analyst (CNA) performs systems and data threat analysis and enterprise-wide monitoring of Government systems and networks for insider threats. Performs baseline audits of usage of all Agency automated information systems and provides feedback in the form of written and oral reports and metrics. Performs focused monitoring capabilities on a case-by-case basis. Performs testing of new software releases/upgrades and policies to ensure compatibility with enterprise applications. Performs network maintenance checks on requisite insider threat monitoring software and third party architecture. The CNA creates policies, performs data analysis, product configuration support, network and database support, and maintenance of the operating server, agent baseline, and database repository; performs software policy analysis, generation, refinement, and testing. Reviews and recommends additional resources required to meet customer mission requirements. Assists the Government in building and deploying software enhancements. Participates in customer program and technical exchange meetings. Provides product specific training on-site and off -site as required.
Responsibilities include but are not limited to:
Maintains the integrity, security and availability of the Insider Threat software tool
Organizes and formats threat analysis reports; identifies events/incidents that require follow-up action
Implements new software or software modifications to comply with design and/or performance requirements
Administers, maintains, develops, and implements policies and procedures for ensuring the security and integrity of software and reports generated (U) Monitors various network logs to ensure proper operation.
Participates in customer program and technical exchange meetings
Supports the development of long and short term analysis and design requirements; database design, development, implementation, and analysis activities
Performs regularly scheduled database back- ups to prevent the potential loss of collected data. Tests backups to ensure the ability to restore data
Performs baseline audits. Develops simple database queries, identify and report software bugs or defects for correction
Assists the Government in building and deploying software and enhancements. Provides training
Makes minor modifications to existing software to correct errors, adapt to new hardware, or improve threat software performance
Performs software testing of new releases/upgrades and policies to ensure compatibility with enterprise applications and full compatibility with all enterprise applications
Performs preventive maintenance inspections of the software operations, hardware integration, and systems logs. Monitors data repositories, identifies, and resolves any performance issues arising from use of the Insider Threat software components and /or the organizational intranet
Configure, integrate, and ensure commercially obtained 3rd-party software patches and updates to enterprise workstations do not result in unexpected loss of capability or other negative impact to monitoring and audit activities
Test new Insider Threat software agents on workstations with representative software loads including any key Agency proprietary applications, ensures thorough and effective testing of requisite agents
Maintain data files and control procedures for a system of networked computers or for a single group of microcomputers linked to a host workstation, or mainframe
Maintain system security and data integrity Assign passwords and monitor use of resources, back up files as required and work with management to define requests for information
Requires in-depth knowledge and experience Uses best practices and knowledge of internal or external business issues to improve products or services Solves complex problems; takes a new perspective using existing solutions
Works independently, receives minimal guidance Acts as a resource for colleagues with less experience
Basic Qualifications/Capabilities:
TS/ SCI with Poly
A Bachelor of Science (BS) degree in Computer Science, Cybersecurity, Engineering, or related field from an accredited college or university is required.
Five (5) years of Cybersecurity Threat Analysis experience in the following disciplines: Cybersecurity techniques and Network Analysis, Insider Threat Analysis software, TCP/IP fundamentals, Windows Operating Systems and supporting Office applications, real-world incident management and incident response.
Information Technology Experience creating knowledge objects and robust queries/searches, along with creating reports and generating charts from the resulting queries/searches using Splunk.
Security Clearance Requirements:
TS/SCI with Poly
Physical Requirements:
Must be able to remain in a stationary position for extended periods of time.
Needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer.
The person in this position frequently communicates with co-workers, management, and customers, which may involve delivering presentations. Must be able to exchange accurate information in these situations.
8.17.CO.GE.CC.23
For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.-person status or obtaining any necessary license. The applicant will be required to answer certain questions for export control purposes, and that information will be reviewed by compliance personnel to ensure compliance with federal law. ManTech may choose not to apply for a license for such individuals whose access to export-controlled technology or software source code may require authorization and may decline to proceed with an applicant on that basis alone.
ManTech International Corporation, as well as its subsidiaries proactively fulfills its role as an equal opportunity employer. We do not discriminate against any employee or applicant for employment because of race, color, sex, religion, age, sexual orientation, gender identity and expression, national origin, marital status, physical or mental disability, status as a Disabled Veteran, Recently Separated Veteran, Active Duty Wartime or Campaign Badge Veteran, Armed Forces Services Medal, or any other characteristic protected by law.
If you require a reasonable accommodation to apply for a position with ManTech through its online applicant system, please contact ManTech's Corporate EEO Department at (phone number removed). ManTech is an affirmative action/equal opportunity employer - minorities, females, disabled and protected veterans are urged to apply. ManTech's utilization of any external recruitment or job placement agency is predicated upon its full compliance with our equal opportunity/affirmative action policies. ManTech does not accept resumes from unsolicited recruiting firms. We pay no fees for unsolicited services.
If you are a qualified individual with a disability or a disabled veteran, you have the right to request an accommodation if you are unable or limited in your ability to use or access (url removed) as a result of your disability. To request an accommodation please click (url removed) and provide your name and contact information.