Threat Analyst

Leonardo DRS, Inc.
Leonardo DRS is a leading supplier of integrated products, services and support to military forces, intelligence agencies and prime contractors worldwide. Focused on defense technology, we develop, manufacture and support a broad range of systems for mission critical and military sustainment requirements, as well as homeland security.
Headquartered in Arlington, VA, the Company is a wholly owned subsidiary of Leonardo S.p.A. which employs more than 47,000 people worldwide. We offer a competitive compensation package and a business culture which rewards performance. Leonardo DRS is committed to being an employer of choice of a highly qualified, diverse, effective, and productive workforce. For additional information on Leonardo DRS, please visit our website at www.leonardodrs.com.
Company Overview
DRS Global Enterprise Solutions, Inc. successfully delivers quality systems and services to CONUS and overseas units. Our systems solutions encompass broad data distribution networks and complex telecommunications systems for data, voice and video applications over integrated satellite, terrestrial, and wireless networks. Our proven service history of engineering, installing, operating and maintaining innovative, low-risk, and cost-effective communications resources illustrates our commitment to supporting military, commercial, and relief efforts at home and around the globe.
Location: Fort Huachuca, AZ
Title: Threat Analyst
Position Summary
Carries out a variety of security controls protecting access to computers and data. Maintains firewalls and intrusion detection systems.
Duties and Responsibilities
Identify threats within client environments through real time analysis of logs and alerts.
Analyze all relevant Cyber event data and other data sources for indicators of attack and potential network compromise, produce reports, and assist with incident response.
Apply knowledge of computer and network architecture to provide analysis during investigations, identifying adversarial activity and methods for future detection and prevention.
Use a combination of Open Source research, network, and host forensic analysis, log review and correlation, and PCAP analysis to complete investigations.
Operate intrusion detection and prevention systems and other point of presence security tools.
Develop comprehensive security write-ups which describe security issues, analysis, and remediation techniques to client leadership.
Carries out a variety of security controls protecting access to computers and data
Maintains firewalls and intrusion detection systems
Conducts regular audits to ensure systems are being operated securely
Researches, evaluates, tests, communicates and implements new security software or devices
Responds to queries and requests for computer security information and reports
Support, communicate, reinforce and defend the mission, values and culture of the organization
Basic Qualifications
DoD 8570 IAT Level II certification
CNDSP Certification: GCIH, CSIH, CEH or GCFA
Active Secret US security clearance or higher
Bachelor's Degree or equivalent combination of education and experience
2+ years applicable experience
Strong verbal, written and interpersonal communication skills
Ability to work independently as well as cooperatively in a team-oriented environment
Ability to successfully interact with other IT professionals and end-users
Strong analytic and problem-solving skills
Is open and responsive to change and demonstrates a commitment to the process of continuous improvement by identifying and responding actively and with sensitivity to the needs of all customers
Leonardo DRS, Inc. and its subsidiaries and affiliates are equal opportunity employers and all qualified applicants will receive consideration for employment without regard to race, color, religion, sexual orientation, gender identity, national origin, disability status, protected veteran status, or any other characteristic protected by law. #CA #CJP/b

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.

More Jobs

Threat Analyst (DCO) - Senior
Sierra Vista, AZ S4 Inc.
Cyber Threat Analyst III
Scottsdale, AZ Early Warning Services, LLC
IBM Security - X-Force - Strategic Cyber Threa...
Phoenix, AZ IBM
Threat Intel Analyst
Scottsdale, AZ ADT Security Services, Inc
Information Security Analyst 4 - Cyber Threat ...
Chandler, AZ Wells Fargo