The Junior Cyber Defense Analyst is responsible for using data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments to mitigate threats.
-
Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities, and distinguish these incidents and events from benign activities.
-
Use cyber defense tools for continual monitoring and analysis of systems to identify malicious activity.
-
Document and escalate incidents, including the event's history, status, and potential impact for further action that may cause ongoing and immediate impact on the environment.
-
Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on the system and information.
-
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.
-
Conduct research, analysis, and correlation across a wide variety of source data sets (indications and warnings).
-
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
-
Perform cyber defense trend analysis and reporting.
-
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources.
-
Coordinate with enterprise-wide cyber defense staff to validate network alerts.
-
Identify and analyze anomalies in network traffic using metadata.
-
Provide daily summary reports of network events and activity relevant to cyber defense practices.
-
Identify applications and operating systems of a network device based on network traffic.
-
Other duties as assigned.