JR Cyber Information Assurance Analyst

Under general technical supervision, performs network monitoring, analysis and reporting in accordance with the provisions of DoD Directive 8570.01-M. These skills and their associated duties may include the following:
o Examines potential security violations, incidents, malicious activity and attacks to determine if policy has been breached, assesses the impact, and preserves artifacts.
o Enters and tracks events and incidents.
o Supports incident escalation and assesses probable damages, identifies damage control and remediation, and assists in developing courses of action.
o Supervises the installation, monitoring, testing, troubleshooting, and administration of IA hardware and software systems.
o Recommends, schedules, and performs IA system repairs, systems administration, and maintenance.
o Analyzes patterns of noncompliance or attacks and recommends appropriate actions to minimize security risks and insider threat.
o Configures, optimizes, and tests network devices.
o Diagnoses and resolves IA problems in response to reported incidents.
o Enhances rule sets to identify or block sources or potential sources of malicious traffic.
o Supports the design and execution of exercise scenarios.
o Implements, and monitors policies and procedures reflecting the legislative intent of applicable laws and regulations.
o Prepares, distributes, and maintains plans, instructions, guidance, and standard operational procedures concerning Information Security.
o Participates in IA risk assessments during the C&A process.
o Prepares, reviews, and evaluates documentation of compliance.
o Prepares recommendations for the DAA. Reviews IA and IA enabled software, hardware, and firmware for compliance with appropriate security configuration guidelines, policies, and procedures.
o Reviews AI security plans.
o Identifies alternative functional IA security strategies to address organizational security concerns.
o Reviews security safeguards to determine that security concerns identified in approved policies, plans, and doctrine have been fully addressed.
o Develops and implements programs to ensure that systems, network, and data users are aware of, understand, and follow IA policies and procedures.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Board Certified Behavioral Analyst (BCBA)
Tucson, AZ Devereux Advanced Behavioral Health
35F10 Intelligence Analyst Course Instructor
Sierra Vista, AZ General Dynamics Information Technology
Behavior Analyst (BCBA)
Phoenix, AZ Devereux Advanced Behavioral Health
PRN - Health Information Coder II
Peridot, AZ SCA Health
Network Administrator: F-35 Autonomic Logistic...
Glendale, AZ BAE Systems
Software Imp Analyst
Phoenix, AZ Alliance Residential Company