Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Become A Defense Analyst

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.

Working As A Defense Analyst

  • Interacting With Computers
  • Getting Information
  • Analyzing Data or Information
  • Evaluating Information to Determine Compliance with Standards
  • Communicating with Supervisors, Peers, or Subordinates
  • Deal with People

  • Mostly Sitting

  • $88,000

    Average Salary

What Does A Defense Analyst Do At General Dynamics Mission Systems

* Responsible for implementing and enforcing national, DOD (8500
* R, etc.), and MDA security policies and directives.
* Oversees intrusion detection, boundary protection and vulnerability assessment operations to defend the C2BMC component of the Ballistic Missile Defense Communications Network (BMD COMNET) and C2BMC mission systems and services.
* Develops a network defense visibility display and directs/executes time sensitive adjustments to the network security posture to minimize or counter operational risk.
* The Network Defender will collect, store and present data and metrics for use by senior leaders to conduct Operational Risk Management (ORM) decisions on the network security posture and perform proactive security functions established to assist BMD organizations in deterring, detecting, isolating, containing, and recovering from information system (IS) and network security intrusions and mitigating known network vulnerabilities.
* The Network Defender will operate and administer the BMD provided IA/CND suite, to include firewalls, correlated log analysis, intruder alert and related services to protect BMD COMNET infrastructure and information services from internal and external threats.
* Performs other related duties and assignments as required

What Does A Defense Analyst Do At CME Group

* Act as lead incident handler for low severity incidents.
* Perform technical analysis of multiple sources of data, including network flows/packet data, host forensic artifacts, and application/system logs.
* Manage incident communications, including establishing/scheduling bridge lines and periodic incident update calls.
* Document incident tasks and updates in the incident management system.
* Personal Attributes:
* Strong customer-service orientation.
* Strong analytical and troubleshooting skills
* High level critical thinking skills.
* Excellent written and oral communication skills.
* Excellent listening and interpersonal skills.
* Ability to communicate ideas in both technical and user-friendly language.
* Ability to conduct research into network/security issues and products.
* Comfortable working in a dynamic environment with multiple goals.
* Highly self-motivated and directed, with keen attention to detail.
* Able to prioritize and execute tasks in a high-pressure environment.
* Experience working in a team-oriented, collaborative environment.
* Ability to deal diplomatically and effectively at all levels of the organization including both technical and non-technical, management and senior leadership

What Does A Defense Analyst Do At M & T Bank

* Carry out 1st and 2nd line support for deployed Security tools.
* This will include both the base Operating system as well as the associated application(s).
* Assist the SOC Analysts in developing correlation logic and signatures associated with the supported Security Tools.
* Strong understanding and knowledge of network security technologies including Netflow, IDS/IPS, WAF, Proxies, NAC and Firewalls.
* Produce situational reports from Lancope, Netwitness, SIEM, F5, ForcePoint.
* Other responsibilities include:
* Produce and maintain operational build and configuration documentation.
* Remain up to date with operating system and network technologies to ensure consistent support across all tools.
* Remain up to date with advances in security tool technologies and have the ability to present such information to senior management.
* Assist projects in deploying security tools in both design and implementation phases.
* Build up and maintain relationships with other support functions within M&T Bank and with external vendors.
* Seek out and identify anomalous activity and behaviors.
* Provide technical risk assessments as required and deliver recommendations and mitigation options.
* Must be able to direct and monitor junior resources, plus coordinate development tasks on small to large scope projects.
* Recommends new technology, policies or processes to benefit the organization and improve deficiencies.
* May lead or participate in technical evaluations of vendor software.
* Performs other related duties or projects as required, which may include playing a lead role in due diligence, cost/benefit analysis or business study activities.
* Provides highly analytical consulting and leadership in identifying and implementing new uses of information technologies to assist business units in meeting strategic objectives.
* Evaluates and understands complex interrelationships and effects among programs, interfacing applications and platforms

What Does A Defense Analyst Do At Parsons Corporation

* Performs monthly and ad hoc vulnerability scans of unclassified and classified network subscriber enclaves.
* Maintain knowledge of emerging threats, vulnerabilities, and intelligence within the cyber security field to ensure subscribers are remediating against known threats.
* Assist subscribers with vulnerability remediation, as necessary.
* Conduct trending and analysis of monthly results to identify high risk vulnerabilities impacting the network and ensure proper security posture from a vulnerability management standpoint.
* Deploy, troubleshoot, and maintain network-based vulnerability scanners at subscriber sites to ensure appropriate coverage of scanning services.
* Maintain knowledge of applicable CND policies, regulations, and compliance documents specifically related to CND auditing.
* Prepare reports for subscribers to assess technical configurations and compliance.
* Generate capture as necessary of the network(s) security posture and provide to CND management for situational awareness.
* Document policies and procedures for the use of vulnerability assessment tools and methodologies.
* Apply technical expertise to perform remote assessments of DoD networks and information systems.
* Possess technical experience in mitigating and/or remediating vulnerabilities or misconfigurations.
* Document findings and severity levels of non-compliance in formalized reporting, written and oral briefs, etc.
* Test and evaluate new technologies, specifically related to network vulnerability scanning
* Provide support to Vulnerability Assessment Support (VAS) Lead, as necessary

What Does A Defense Analyst Do At Leidos

* Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host.
* Find evidence of attack, and attackers actions thereafter.
* Work with team to produce effective countermeasures against found evidence.
* Also, contributes to mitigations for future attacks of a similar nature.
* Follow Security Operations Center (SOC) policies, procedures for incident reporting and management.
* Create a detailed Incident Report (IR) and contribute to lessons learned. .
* Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800
* ATO artifacts, Vulnerability scans, Access Control Lists (ACL), and vendor documentation to thoroughly understand software behaviors and interactions. .
* Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.
* Study and understand IANA, W3C, IETF and other internet bodies’ protocol RFC definitions to understand violations and security weaknesses.
* Conduct forensic testing and operational hardening of multiple OS platforms.
* Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture.
* Work with SOC shift team to help contain intrusions.
* Provides detailed requirements to team security engineers, SIEM specialists, and other team capability developers to provide reusable hunt tactics and techniques for other team analysts.
* Provide detailed input to watchlog and provide thorough pass-down.
* Generates documentation as required by the US Census.
* External Referral Eligible
* LeadGen
* LeadCyber

Show More

Show Less

How To Become A Defense Analyst

Most information security analyst positions require a bachelor’s degree in a computer-related field. Employers usually prefer analysts to have experience in a related occupation.

Education

Information security analysts usually need at least a bachelor’s degree in computer science, programming, or a related field. As information security continues to develop as a career field, many schools are responding with information security programs for prospective job seekers. These programs may become a common path for entry into the occupation. Currently, a well-rounded computer education is preferred.

Employers of information security analysts sometimes prefer applicants who have a Master's of Business Administration (MBA) in information systems. Programs offering the MBA in information systems generally require 2 years of study beyond the undergraduate level and include both business and computer-related courses.

Work Experience in a Related Occupation

Information security analysts generally need to have previous experience in a related occupation. Many analysts have experience in an information technology department, often as a network or systems administrator. Some employers look for people who have already worked in fields related to the one in which they are hiring. For example, if the job opening is in database security, they may look for a database administrator. If they are hiring in systems security, a computer systems analyst may be an ideal candidate.

Licenses, Certifications, and Registrations

There are a number of information security certifications available, and many employers prefer job candidates to have one. Certification validates the knowledge and best practices required from information security analysts. Some are general information security certificates, such as the Certified Information Systems Security Professional, and others have a narrow focus, such as penetration testing or systems auditing.

Advancement

Information security analysts can advance to become chief security officers or another type of computer and information systems manager.

Important Qualities

Analytical skills. Information security analysts must carefully study computer systems and networks and assess risks to determine how security policies and protocols can be improved.

Detail oriented. Because cyberattacks can be difficult to detect, information security analysts pay careful attention to their computer systems and watch for minor changes in performance.

Ingenuity. Information security analysts anticipate information security risks and implement new ways to protect their organizations’ computer systems and networks.

Problem-solving skills. Information security analysts respond to security alerts and uncover and fix flaws in computer systems and networks.

Show More

Show Less

Defense Analyst jobs

Add To My Jobs
Job type you want
Full Time
Part Time
Internship
Temporary

Top Skills for A Defense Analyst

ProceduresIntrusionDetectionSystemsCyberOperationsDODCNDTechnicalInformationArcsightIds/IpsWiresharkNetworkSecurityIntelligenceCommunityComputerNetworkIntrusionDetectionAnalysisIntrusionDetectionToolsMissileNetworkIntrusionsAssuranceNetworkTrafficIncidentResponseSuspiciousActivity

Show More

Top Defense Analyst Skills

  1. Procedures
  2. Intrusion Detection Systems
  3. Cyber Operations
You can check out examples of real life uses of top skills on resumes here:
  • Evaluated current and future commercial imagery capabilities and commercial satellite data tactics, techniques, procedures, and equipment.
  • Updated and maintained intrusion detection systems for the New York field office.
  • Conducted vulnerability assessments and passive network traffic analysis of DoD and US Government networks.
  • Provided network forensics support to the NSOC's CND Analysis, Fusion, and Monitoring capability.
  • Provide technical information to AF Customers on devices with an emphasis on any possible security issues with them.

Top Defense Analyst Employers