FIND PERSONALIZED JOBS
Sign up to Zippia and discover your career options with your personalized career search.
Sorry, we can't find that. Please try a different city or state.

Senior Cyber Security Analyst

This job has expired and is no longer available.
APPLY NOW
Apply Now
×
FIND
PERSONALIZED JOBS

Sorry, we can't find that. Please try a different city or state.

CONTENT HAS
BEEN UNLOCKED
Close this window to view unlocked content
or
find interesting jobs in

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign Up

SIGN UP TO UNLOCK CONTENT

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Forgot Password?

Don't have an account? Sign Up

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Log In

Log In to Save

Sign Up to Save

Sign Up to Dismiss

Sign up to save the job and get personalized job recommendations.

Sign up to dismiss the job and get personalized job recommendations.

or

The email and password you specified are invalid. Please, try again.

Email and password are mandatory

Already have an account? Log in

reset password

Enter your email address and we will send you a link to reset your password.

Back to Log In

Company Saved

Answer a few questions and view jobs at that match your preferences.

Where do you want to work?

Job Saved

See your Saved Jobs now

or

find more interesting jobs in

Job Dismissed

Find better matching jobs in

Your search has been saved!

Top 50 Senior Cyber Security Analyst Skills

Below we've compiled a list of the most important skills for a Senior Cyber Security Analyst. We ranked the top skills based on the percentage of Senior Cyber Security Analyst resumes they appeared on. For example, 6.7% of Senior Cyber Security Analyst resumes contained Cyber as a skill. Let's find out what skills a Senior Cyber Security Analyst actually needs in order to be successful in the workplace.

These are the most important skills for a Senior Cyber Security Analyst:

1. Cyber

demand arrow
high Demand
Here's how Cyber is used in Senior Cyber Security Analyst jobs:
  • Formulated resolution of highly visible vulnerabilities identified during Command Cyber Readiness Inspection, resulting in exceeding milestone date expectations.
  • Produced cyber technical intelligence assessments for investigations stemming from the intelligence, law enforcement, and computer security communities.
  • Perform open source and emerging technology analysis across software and network in support of the cyber security operations.
  • Conduct cyber intelligence analysis, coordination, and interaction across the networks and infrastructure components.
  • Perform cyber security analysis on multiple technologies through innovative and strategic execution.
  • Conduct cybersecurity capability validations in accordance with established practices and standards.
  • Investigated, escalated, and documented cyber incident reports.
  • Monitor & Audit Cyber Security Vulnerabilities and Risk.
  • Lead cyber security incident investigations.
  • Work with the necessary infrastructure teams to evaluate our overall security posture against to meet the needs of appropriate cyber security.
  • Played key role as Subject Matter Expert in ensuring security baseline met Command Cyber criteria for excellent rating during security audit.
  • Recommend changes to the current strategy and program based on external threat factors and known good cyber protection initiatives.
  • Supported the recruitment, assessment, and hiring effort for the Cyber Analysis & Operations Coordination Center.
  • Coordinate with Legal, Trade Controls, Global Supply Chain to identify cyber security best practices.
  • Hand selected over numerous peers to join one of the Army's elite Cyber Protection Teams.
  • Worked with vendors to determine whether products would meet current cyber requirements.
  • Assisted and supported Cyber Security Incident or Service Response Teams when necessary.
  • Risk Operations Training: administered monthly trainings to risk operation teams to improve their cybercrime knowledge in analyzing suspicious alerts/transaction.
  • Promote and support cyber security effectiveness through accurate and timely deliverables.
  • Led a team of four Cyber Security Analyststhat supported the U.S. Senate network.

Show More

73 Cyber Jobs

No jobs at selected location

2. Vulnerability Assessments

demand arrow
high Demand
Here's how Vulnerability Assessments is used in Senior Cyber Security Analyst jobs:
  • Performed literally thousands of cyber security vulnerability assessments/analysis.

Show More

8 Vulnerability Assessments Jobs

No jobs at selected location

3. Ensure Compliance

demand arrow
high Demand
Here's how Ensure Compliance is used in Senior Cyber Security Analyst jobs:
  • Performed analysis of security documents to ensure compliance with FISMA and NIST cyber security framework.

Show More

4. Nist

demand arrow
high Demand
Here's how Nist is used in Senior Cyber Security Analyst jobs:
  • Examine, interview, and test procedures in accordance with NIST 800-53A Rev 4 to determine the effectiveness of security controls.
  • Implemented Department of Energy and NIST standards (U.S. Commerce Department's National Institute of Standards and Technology).
  • Have working knowledge of CNSSI 4005 Safeguarding COMSEC Facilities and Materials & NIST 800 series of Special Publications.
  • Execute, examine, interview, and test procedures in accordance with NIST 800-53 Revision 3.
  • Established metrics to ensure continuous improvement and ongoing compliance with NIST SP800-53 Rev-4.
  • Assisted in the antivirus maintenance and system security administration of a classified network.

Show More

16 Nist Jobs

No jobs at selected location

5. Information Technology

demand arrow
high Demand
5 Information Technology Jobs

No jobs at selected location

Job type you want
Full Time
Part Time
Internship
Temporary

6. Incident Response

demand arrow
high Demand
Here's how Incident Response is used in Senior Cyber Security Analyst jobs:
  • Coordinated resources during enterprise incident response efforts, driving incidents to timely and complete resolution.
  • Supported incident response and conducted forensic analysis for incidents that had a high level of impact on the enterprise.
  • Created incident response plans, including coordination with appropriate departments, other business units, and appropriate authorities.
  • Supervised two staff within the Intelligence Community Incident Response Center.
  • Completed senior level training in incident response, cyber planning, advanced network forensics, and advanced tool automation.
  • Support customer with performing Cyber Incident Response Team (CIRT) operations as a shift team lead.
  • Performed real-time Computer Network Defense Incident Handling tasks to support deployable Incident Response Teams (IRTs).
  • Performed Incident Response for new/emerging vulnerabilities: (Heartbleed, Shellshock, Poodle).

Show More

25 Incident Response Jobs

No jobs at selected location

7. Assurance

demand arrow
high Demand
Here's how Assurance is used in Senior Cyber Security Analyst jobs:
  • Support federal IT staff and managers in documenting and presenting information regarding newly established Information Assurance /IT security processes.
  • Develop Information Assurance Security policies and procedures, analyze system designs and configurations to support command security requirements.
  • Provide support for the creation of reports and compliance dashboards based on the data gathered through these assurance programs.
  • Reduced information assurance maintenance cost of the FMQ-23 by $15,000 and the FMQ-22 by $95,000.
  • Delivered professional senior-level Cyber Security support and Information Assurance for an Intelligence Community (IC) client.
  • Conduct security vulnerability and information assurance by assessing latest release of the vulnerabilities, hotfixes, technical advisories, and more.

Show More

14 Assurance Jobs

No jobs at selected location

8. Risk Assessments

demand arrow
high Demand
Here's how Risk Assessments is used in Senior Cyber Security Analyst jobs:
  • Perform risk assessments on an application according to NIST SP 800-30.

Show More

2 Risk Assessments Jobs

No jobs at selected location

9. System Security Plan

demand arrow
high Demand
2 System Security Plan Jobs

No jobs at selected location

10. DOD

demand arrow
high Demand
Here's how DOD is used in Senior Cyber Security Analyst jobs:
  • Conduct network vulnerability security assessments on DoD networks.
  • Submit systems for registration in the DoD IT Portfolio Repository - Department of the Navy (DITPR-DON) portfolio management database.
  • Researched and authored white paper advocating a framework for managing risk to the most critical DoD systems.
  • Served as the DoD liaison officer at the DHS/FEMA National Operations Center on an as needed basis.
  • Ensured IT networks were in compliance with federal and Department of Defense (DOD) regulations.
  • Provide DoD PKI expertise and support to multiple vendors and test support personnel.
  • Perform DISA STIG reviews on Information system to ensure compliance with DoD standards.
  • Performed Insider Threat auditing IAW DoD, IC, and Agency directives.
  • Authored multiple congressional reports on status of implementing SCRM in DoD.
  • Developed and institutionalized, strategic process to ensure accurate assessment of security baseline remains current to DOD compliancy standards.
  • Coordinated multiple exercises with internal and external DOD agencies to ensure continuity of operations.
  • Drafted new and updated existing DoD cybersecurity policies.
  • Research hardware/software requirements (DoD Application and Database Management System (DADMS).
  • Attend Security Conferences: Blackhat, Defcon, FBI, DoD, etc

Show More

25 DOD Jobs

No jobs at selected location

11. Nessus

demand arrow
high Demand
Here's how Nessus is used in Senior Cyber Security Analyst jobs:
  • Designed and implemented vulnerability Nessus scans and monitored networks using Security Center and Vulnerability Management Database (VMDB).
  • Use Nessus Security Center to scan all agency networks for software/application vulnerabilities.
  • Experience with vulnerability scanning using Nessus.
  • Utilize Tenable Nessus scanning tool to scan network assets and submit bi-monthly reports concerning the status vulnerability within the environment.
  • Perform Vulnerability and Compliance scans via Nessus and WebInspect whilst mapping each finding to the NIST SP 800-53 Revision 4.
  • Analyze security reports (Appscan, Nessus) to identify vulnerabilities and create mitigation strategies.

Show More

6 Nessus Jobs

No jobs at selected location

12. Security Policies

demand arrow
high Demand
Here's how Security Policies is used in Senior Cyber Security Analyst jobs:
  • Developed security policies and/or plans.
  • Participated in network and systems design to ensure the implementation of appropriate systems security policies.
  • Collaborate to develop cyber security policies, implement procedures, and recommend training.

Show More

15 Security Policies Jobs

No jobs at selected location

13. Acas

demand arrow
high Demand
Here's how Acas is used in Senior Cyber Security Analyst jobs:
  • Performed ACAS vulnerability management scanning and reporting.

Show More

14. POA

demand arrow
high Demand
Here's how POA is used in Senior Cyber Security Analyst jobs:
  • Review network DIACAP to include relevant artifacts such as POA&M to ensure compliance.

Show More

6 POA Jobs

No jobs at selected location

15. Information Security

demand arrow
average Demand
Here's how Information Security is used in Senior Cyber Security Analyst jobs:
  • Handle the tasks of defining and reviewing technology implementations, information security policy, and guidelines for business operations.
  • Solicited comments and recommendations from Information Security Officers and agencies regarding CSH volumes.
  • Engineer, design, evaluate and integrate information security infrastructure solutions.
  • Analyze & report vulnerabilities to Chief of IT & Financial Service Management Information Security Officers (ISOS).
  • Mentored junior analysts on not only information security but also on networking concepts, design, and terms.
  • Worked closely with the Chief Information Security Officer (CISO) to ensure that expectations are met.
  • Operate Electronic key Management System, other information security duties, and Public Key Infrastructure.
  • Establish Written Information Security Policies Following NIST, ISO27000 Framework Guidelines.

Show More

20 Information Security Jobs

No jobs at selected location

16. Security Incidents

demand arrow
average Demand
Here's how Security Incidents is used in Senior Cyber Security Analyst jobs:
  • Conduct investigative analysis on the security incidents and take appropriate security measures to mitigate and remove security risks.
  • Coordinated possible security incidents with appropriate organizations.
  • Conduct advanced incident response actions security incidents.
  • Advised incident responders in the steps to take to investigate and resolve computer security incidents.

Show More

9 Security Incidents Jobs

No jobs at selected location

17. Siem

demand arrow
average Demand
Here's how Siem is used in Senior Cyber Security Analyst jobs:
  • Created SOPs for monitoring the SIEM health and performing packet level analysis.
  • Interrogate and monitor agency network traffic using QRadar SIEM.
  • Generate and develop daily security report using SIEM device and SOPs for incident management/analysis/reporting, network analysis, and etc.
  • Assisted with the general administration of the Splunk SIEM and reviewed Splunk dashboards and events for anomalous activity.

Show More

12 Siem Jobs

No jobs at selected location

18. Splunk

demand arrow
average Demand
Here's how Splunk is used in Senior Cyber Security Analyst jobs:
  • Imported data sources into Splunk and wrote custom RegEx to parse key fields.
  • Created Splunk queries and dashboards to automate the identification of insider threat activity.
  • Installed Splunk apps for the various logs sources.
  • Supported Splunk data source configuration processes and provided Splunk technical services to projects, user requests and data queries.

Show More

16 Splunk Jobs

No jobs at selected location

19. Mcafee

demand arrow
average Demand
Here's how Mcafee is used in Senior Cyber Security Analyst jobs:
  • Administered enterprise McAfee HBSS implementations on three separate DOE networks.
  • Lead engineer for standing up McAfee MOVE implementation for providing AV coverage to non-persistent VDI systems.
  • Utilized McAfee ePO to run reports and checks on end hosts.
  • Utilized McAfee NSM to pull historical data and export PCAPs in Wireshark.

Show More

1 Mcafee Jobs

No jobs at selected location

20. Security Events

demand arrow
average Demand
Here's how Security Events is used in Senior Cyber Security Analyst jobs:
  • Produce reports and metrics to identify significant security events as required by management.
  • Mentored junior analysts on potential security events' investigation using ArcSight ESM.
  • Served as a Crisis Management Information Manager on the OSD Watch staff during exercises and National Special Security Events.
  • Review security events that are populated in a Security Information and Event Management (SIEM) system.
  • Build and maintain common Indicators of Compromise to hunt throughout the environment for security events.
  • Reviewed junior analysts' work and advised them before escalating security events to clients.
  • Briefed management on security events pertaining to clients' environment during daily morning calls.
  • Created weekly activity reports for management regarding security events handled by the SOC.
  • Utilized Windows Event Viewer on Windows Server 2008 to pull security events.
  • Utilized ArcSight Logger to pull and export security events.
  • Reviewed threats and security events for the DoS CIRT.
  • Developed and implemented a methodology using Arcsight Use Case UML processes that identified procedures for correlating security events.
  • Produced reports identifying significant or suspicious security events, which include latest security threat information.
  • Worked with and monitored variety of Channels in Arcsight from different security events.
  • Analyze cyber security events for root cause and impact to enterprise.

Show More

11 Security Events Jobs

No jobs at selected location

21. IDS

demand arrow
average Demand
Here's how IDS is used in Senior Cyber Security Analyst jobs:
  • Utilize IDS / IPS, session data, full-content data, network forensics and host-based tools for events and anomalies.
  • Analyzed and drilled down on security event data from the network (IDS sensors, firewall traffic and routers).
  • Create and updated firewall and IPS, IDS signatures and rules as needed to secure the network.
  • Tested various scanning products against IDS systems in order to create alerts notifications on traffic generated.
  • Monitor and analyze network traffic and IPS and IDS alerts.
  • Monitor IDS/IPS alerts via ArcSight Use ArcSight Logger as an additional tool for deeper investigation into network traffic from ArcSight.
  • Monitored IDS/IPS alerts , logs and provide determination of suspected anomalies.
  • Experience in designing Security of Infrastructure using Palo Alto and Cisco ASA firewalls and configuring IPS/IDS, DDoS for threat prevention.

Show More

4 IDS Jobs

No jobs at selected location

22. Ips

demand arrow
average Demand
Here's how Ips is used in Senior Cyber Security Analyst jobs:
  • Established and Manage Distributor, Re-seller Relationships.
  • Spearheaded testing and implementation of various HBSS modules including AV, Host IPS, DLP, and ACCM.
  • Utilized HP Tipping Point IPS to monitor potential intrusion events.

Show More

12 Ips Jobs

No jobs at selected location

23. Fisma

demand arrow
average Demand
Here's how Fisma is used in Senior Cyber Security Analyst jobs:
  • Perform annual reviews of documentation to meet FISMA requirements.
  • Support senior leadership with FISMA, CCRI, and IG inspections Serves as the senior member of the IAVA compliance team.

Show More

8 Fisma Jobs

No jobs at selected location

24. Arcsight

demand arrow
average Demand
6 Arcsight Jobs

No jobs at selected location

25. Firewall

demand arrow
average Demand
Here's how Firewall is used in Senior Cyber Security Analyst jobs:
  • Analyze security and firewall logs and investigate all irregularities as needed.
  • Utilized Syslog-NG on Red Hat Linux to pull firewalls, Windows, and DHCP logs.
  • Perform the tasks of providing support in the administration of firewalls on a daily basis.
  • Worked with Cisco PIX 500 series, Cisco FWSM, ASA 5500 and CheckPoint Firewalls R61 - R75.

Show More

13 Firewall Jobs

No jobs at selected location

26. Disa

demand arrow
average Demand
Here's how Disa is used in Senior Cyber Security Analyst jobs:
  • Respond to unauthorized scanning activity by disabling ports.
  • Contribute to self- assessments and continuous monitoring through the use of DISA STIG Checklists.
  • Develop Continuity of Operations (COOP) and Disaster Recovery (DR).
  • Guided the team in development of the SSPs, RARs, and Disaster Recovery Plans (DRPs).

Show More

8 Disa Jobs

No jobs at selected location

27. RMF

demand arrow
average Demand
Here's how RMF is used in Senior Cyber Security Analyst jobs:
  • Performed NIST 800-53 security controls assessment in accordance with NIST 800-37 Risk Management Framework (RMF).
  • Migrate DIACAP systems to RMF in eMASS.
  • Monitor RMFpackage status and maintain system state in eMASS as a part of continuous monitoring and the Authorization andAssessment process.

Show More

28. Network Security

demand arrow
average Demand
Here's how Network Security is used in Senior Cyber Security Analyst jobs:
  • Provide assistance toward the development and implementation of information assurance and network security best practices for the organization operational effectiveness.
  • Interacted with clients to receive requests, request clarifications, triage, troubleshoot and resolve Network Security issues.
  • Performed analysis of log files from a variety of sources to identify possible threats to network security.

Show More

12 Network Security Jobs

No jobs at selected location

29. ISS

demand arrow
average Demand
Here's how ISS is used in Senior Cyber Security Analyst jobs:
  • Assured that continuity and disaster recovery requirements were identified and met for mission critical services.
  • Researched Cyber-CI/CE/CT efforts involving domestic/international nuclear detection issues.
  • Implemented, configured, and monitored both HBIDS and NIDS products from ISS, Cisco, and GFI.
  • Participated in or lead reviews, on-site and remotely, of compliance issues, requirements, issues.
  • Managed data collection, assembly, preparation and submission for site and system accreditation packages.
  • Use the following IDS software Dragon and ISS to identify possible threats to the network.
  • Managed the Information Systems Security Officer (ISSO) training program for SSC Pacific.
  • Partner with groups across SRP to foster collaboration and gain acceptance on security issues/strategies.
  • Performed first level review for annual DOL inventory submissions.
  • Serve as Cyber Security Operational Analyst responsible for identifying and supporting the installations Information Assurance certification, accreditation and security issues.
  • Provide recommendations for mitigating system vulnerabilities through system security control remediation and redress; collaborate with ISSOs and security stewards.
  • Provide analytical support for the development and submission of artifacts and documentation in compliance with RMF requirements.
  • Worked with Site ISSO/ISSMs and IT Personnel in deploying new HBSS modules throughout the DOE Enterprise.
  • Use Splunk and FireEye CMS, among other tools for security response to triage security issues.
  • Coordinate with Information System Security Officers (ISSOs) regarding their systems.
  • Inspect physical environments suitabilitiy to host information systems (ISs).
  • Utilized FireEye,ISS,McAfee,Wireshark and splunk to assist in detecting and uncovering malicious content.

Show More

1 ISS Jobs

No jobs at selected location

30. Fireeye

demand arrow
low Demand
Here's how Fireeye is used in Senior Cyber Security Analyst jobs:
  • Used FireEye to aid in attack and attack vector investigations.

Show More

31. Security Requirements

demand arrow
low Demand
Here's how Security Requirements is used in Senior Cyber Security Analyst jobs:
  • Work with stakeholders to define and analyze system security requirements and provide technical solutions to best fit the customers' needs.
  • Developed plans to make information systems compliant with Federal and VA/VBA IT security requirements.

Show More

19 Security Requirements Jobs

No jobs at selected location

32. Internet

demand arrow
low Demand

33. Linux

demand arrow
low Demand
1 Linux Jobs

No jobs at selected location

34. Fips

demand arrow
low Demand

35. SOC

demand arrow
low Demand
Here's how SOC is used in Senior Cyber Security Analyst jobs:
  • Alerted the SOC to all intrusion attempts and report findings to appropriate parties.
  • Supervised and managed information security assets associated with DISA STIGS and HBSS.
  • Developed and Administrate the Company and Social Media presence.
  • Provide Customer Cyber Security Reinforcement Training, Identify and Modify Social Behaviors Risk.
  • Perform ArcSight performance tuning and generate report, Real-time rule, trend, Active-list to provide Situational Awareness to SOC.

Show More

36. IC

demand arrow
low Demand
Here's how IC is used in Senior Cyber Security Analyst jobs:
  • Coordinate periodic reviews and conduct information system audits as established in the security authorization documentation.
  • Sole security monitoring Analyst/Manager for three medical applications and their sub-interfaces.
  • Collaborated with business management to communicate security risk and countermeasures.
  • Contain eradicate and recover from classified and unclassified spills.
  • Shared security expertise in public outreach events.
  • Participate in process improvement initiatives.
  • Plan, implement and evaluate internal and external communications, including executive presentations, governance activities, emails and threat briefings.
  • Work with vendors, customer and team members to isolate and eradicate incidents as they may occur.
  • Reduced reporting and resolution time of Host Based Security System (HBSS) deficiencies by 68%.
  • Performed application scans (MVM) for assets that are requesting access to the NASA network.
  • Conducted reviews of Certification and Accreditation Packages for SSC Pacific at the Echelon II level.
  • Served as Lead Certification and Accreditation (A&A) tester.
  • Guided leadership, peers and subordinates in tactics techniques and procedures.
  • Skilled in the use of Remedy for ticketing process and procedures.
  • Provide guidance to CAPP stakeholders on cyber security, physical security and operations security (OPSEC) policies and methodologies.
  • Evaluate Chemical Agent-Destruction Pilot Plants (CAPPs) and Industrial Control Systems (ICS) policies and procedures.
  • Participated in reviews and analysis of projects that have an impact on the IT security of PTO.
  • Manage communications for cyber incidents and threats.
  • Provide cyber intelligence team with technical input to supplement their weekly intelligence summaries on current cyber threats.
  • Conducted research in regards to specific exploits, malware and known malicious domains.

Show More

37. CND

demand arrow
low Demand
Here's how CND is used in Senior Cyber Security Analyst jobs:
  • Collected intrusion artifacts and use discovered data to enable mitigation of potential CND incidents within the enterprise.
  • Coordinate and distribute CND, vulnerability, and threat advisories to identified consumers.

Show More

38. Management System

demand arrow
low Demand

39. DHS

demand arrow
low Demand
Here's how DHS is used in Senior Cyber Security Analyst jobs:
  • Maintain up to date knowledge of security and privacy mandates from NIST, OMB, DHS, and FISMA.
  • Work closely with CGIS, DIA, DHS, & NTOC.

Show More

40. SME

demand arrow
low Demand
Here's how SME is used in Senior Cyber Security Analyst jobs:
  • Conduct research and evaluate threat intelligence to develop in-depth analysis and assessment on threats to critical networks and infrastructure components.
  • Risk assessment duties, including reporting and oversight of remediation efforts to address negative findings and management of outside assessors
  • Conduct Risk and Vulnerability Assessments and Operational Threat Assessments using automated vulnerability scans and penetration tests.
  • Developed mitigation and remediation plans as a result of vulnerability assessment findings.
  • Develop recommendations based on findings from System Security Control Assessment.
  • Provided Subject Matter Expert (SME) support for artifact and IA controls validation for the organizations DIACAP Packages.
  • Produce artifacts required to satisfy Assessment and Authorization (A&A) process in accordance with Federal policies.
  • Create detailed assessment reports, including system overviews, comprehensive risk analysis, supporting artifacts and findings matrix.
  • Monitored for spear phishing, web attacks, intrusions, insider threats, and performed intermediate vulnerability assessments.
  • Provide guidance on assessment and authorization (A&A) methods, policies and procedures.
  • Experience in writing IV&V assessment reports including all standards utilized for analysis.
  • Perform quality assurance (QA) efforts on individual team member assessment findings.
  • RISK - provided SME recommendations to reduce exposure to potential future threats.
  • Produce security assessment reports (SAR).
  • Conduct physical security and IT assessments.
  • Perform assessment of SDLC process maturity and coordinate security lifecycle across multiple projects in different geographies.
  • Experience with communicating with different customers, IT teams ingathering toward vulnerability assessment.
  • Provided SME support for DISA VMS and eMASS to ensure asset vulnerability accountability, remediation and/or mitigation.
  • Performed network wide vulnerability assessment utilizing Kali Linux, Foundstone, Nessus / SecurityCenter 5.0.
  • Review Assured Compliance Assessment Solution (ACAS) NESSUS scans/SCAP results for Redhat Linux and Windows operating systems.

Show More

2 SME Jobs

No jobs at selected location

41. Wireshark

demand arrow
low Demand
Here's how Wireshark is used in Senior Cyber Security Analyst jobs:
  • Utilized Wireshark to analyze DNS and HTTP traffic traces.
  • Experienced in tools utilization of Netflow, Niksun, HBSS, Nitroview and Wireshark meeting the Department of Defense organization requirements.

Show More

3 Wireshark Jobs

No jobs at selected location

42. ST

demand arrow
low Demand
Here's how ST is used in Senior Cyber Security Analyst jobs:
  • Developed, tuned, and maintained tools to automate analysis capabilities for network-based, host-based and log-based security event analysis.
  • Take appropriate steps to demonstrate effective level of controls are in place to protect sensitive/confidential information within the environment.
  • Assisted customers in identifying and documenting the risks and developing mitigation strategies for information systems.
  • Investigate and report security violations and identify a corrective action plan.
  • Perform risk management while identifying emerging and existing threats.
  • Develop effective training and procedures for investigating events accordingly.
  • Investigate intrusion attempts and perform in-depth analysis of exploits.
  • Develop, implement and execute test plans for IT Systems in support of the risk management framework process within the department.
  • Identify infected hosts and facilitate the isolation, investigation and remediation of those hosts to return them to the network.
  • Create and conduct Annual Security Training for team project staff or when the Security Incident Handling procedures change.
  • Identify and escalate instances of unauthorized media and or software on client network and facilitate its removal.
  • Provided executive presentations to CISO & CIO weekly on state of network vulnerabilities / patch efforts.
  • Assisted customers in characterizing their Information Systems as it pertains to C&A.
  • Meet project deadlines and ensure quality control of project stages.
  • Determine impact of potential intrusions on the network and infrastructure.
  • Validated attacks against client networks and assessing the impact.
  • Provide guidance to junior staff members.
  • Stay abreast of latest vulnerabilities, exploits and other relevant threat-related information.
  • Riverbed was also used to acquire information between an internal system and a possible malware system.
  • Created and launched Powershell script to scan event logs for all changes to systems.

Show More

2 ST Jobs

No jobs at selected location

43. Security Issues

demand arrow
low Demand
12 Security Issues Jobs

No jobs at selected location

44. DNS

demand arrow
low Demand
Here's how DNS is used in Senior Cyber Security Analyst jobs:
  • Involved in troubleshooting of DNS, DHCP and other IP conflict problems.

Show More

4 DNS Jobs

No jobs at selected location

45. Sourcefire

demand arrow
low Demand
3 Sourcefire Jobs

No jobs at selected location

46. Security Assessment Reports

demand arrow
low Demand

47. A Process

demand arrow
low Demand
Here's how A Process is used in Senior Cyber Security Analyst jobs:
  • Configure, operate, monitor, and evaluate IT systems and data processing equipment and executions for optimal performance.
  • Provide guidance and assistance to stakeholders during the C&A process.

Show More

48. ATO

demand arrow
low Demand
Here's how ATO is used in Senior Cyber Security Analyst jobs:
  • Investigated email headers to extract malicious indicators including IP, sender address malicious domains.
  • Assist with log correlation and investigation alongside the system administrator and network engineers.
  • Served as Lead McAfee Vulnerability Management scanning coordinator/manager/assigner.
  • Assist system owners with the whole accreditation process in order to obtain an Authority To Operate (ATO).
  • Develop and update Standard Operating Procedures (SOP) guides for both end user and system administrators.
  • Lead ArcSight SIEM, MacAfee HBSS, mail gateway and firewall administrator.
  • Perform monthly network discovery scans to verify all IP connective devices * Manage resolution of Retina/Nessus vulnerabilities with System Administrators
  • Utilize Xacta to perform steps required by the Risk Management Framework (RMF) in support of the ATO process.
  • Provided SME Level Cyber Security expertise in development of DISA COMBINED FEDERATED BATTLE LABORATORIES NETWORK-CFBL proposal tasks.
  • Prepare IA Controls reports with justification using DISA Vulnerator compiler tool.
  • Participated in multi-level Cyber Security discussions regarding CBP operator nuclear detection operations/functions.
  • Monitor and track remediation progress in Risk Vision GRC Prepare and review Authorization to Operate (ATO) packages (i.e.
  • Conduct open source research on IOC (Indicators of Compromise) to provide intel to the organizations cyber community.
  • Review SSPs, RARs, and Contingency Plans (CPs) pre-/post ATO for compliance with EPA requirements.

Show More

6 ATO Jobs

No jobs at selected location

49. Symantec

demand arrow
low Demand
Here's how Symantec is used in Senior Cyber Security Analyst jobs:
  • Correlated events with SPLUNK and Symantec SIM to weed out False positives and identify real threats and intrusions internal and external.

Show More

50. Major Applications

demand arrow
low Demand
Here's how Major Applications is used in Senior Cyber Security Analyst jobs:
  • Participated in Certification & Accreditation packages based on NIST standards for general support systems and major applications.

Show More

Senior Cyber Security Analyst Jobs

NO RESULTS

Aw snap, no jobs found.

20 Most Common Skills For A Senior Cyber Security Analyst

Cyber

10.1%

Vulnerability Assessments

8.3%

Ensure Compliance

8.0%

Nist

6.6%

Information Technology

6.4%

Incident Response

6.3%

Assurance

5.9%

Risk Assessments

5.5%

System Security Plan

4.6%

DOD

4.5%

Nessus

4.5%

Security Policies

3.8%

Acas

3.8%

POA

3.5%

Information Security

3.2%

Security Incidents

3.2%

Siem

3.1%

Splunk

3.1%

Mcafee

2.9%

Security Events

2.8%
Show More

Typical Skill-Sets Required For A Senior Cyber Security Analyst

Rank Skill
1 Cyber 6.7%
2 Vulnerability Assessments 5.5%
3 Ensure Compliance 5.3%
4 Nist 4.4%
5 Information Technology 4.3%
6 Incident Response 4.2%
7 Assurance 3.9%
8 Risk Assessments 3.6%
9 System Security Plan 3.1%
10 DOD 3.0%
11 Nessus 3.0%
12 Security Policies 2.5%
13 Acas 2.5%
14 POA 2.3%
15 Information Security 2.1%
16 Security Incidents 2.1%
17 Siem 2.0%
18 Splunk 2.0%
19 Mcafee 1.9%
20 Security Events 1.9%
21 IDS 1.9%
22 Ips 1.9%
23 Fisma 1.8%
24 Arcsight 1.7%
25 Firewall 1.6%
26 Disa 1.4%
27 RMF 1.4%
28 Network Security 1.4%
29 ISS 1.3%
30 Fireeye 1.3%
31 Security Requirements 1.2%
32 Internet 1.1%
33 Linux 1.1%
34 Fips 1.1%
35 SOC 1.0%
36 IC 1.0%
37 CND 0.9%
38 Management System 0.9%
39 DHS 0.9%
40 SME 0.8%
41 Wireshark 0.8%
42 ST 0.8%
43 Security Issues 0.8%
44 DNS 0.8%
45 Sourcefire 0.8%
46 Security Assessment Reports 0.8%
47 A Process 0.7%
48 ATO 0.7%
49 Symantec 0.7%
50 Major Applications 0.7%
{[{skill.rank}]} {[{skill.name}]} {[{skill.percentageDisplay}]}%
Show More

11,539 Senior Cyber Security Analyst Jobs

Where do you want to work?

To get started, tell us where you'd like to work.
Sorry, we can't find that. Please try a different city or state.