Overview
Gov CIO is hiring a Cybersecurity Analyst 2 to support the USFK USACIAS-P program in the Republic of Korea (South Korea). This position will be located at USAG Humphreys, Pyeongtaek, Korea, and will be a fully onsite position.
Responsibilities
Correlates threat data from various sources to establish the identity and modus operandi of hackers active in the client's networks and posing a potential threat. Provides the customer with assessments and reports to facilitate situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and intrusion support for high-technology investigations, including computer evidence seizure, computer forensic analysis, data recovery, and network assessments. Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, and network security and encryption.
Collaborates with intrusion analysts to identify, report on, and coordinate remediation of cyber threats to the client.
Provides timely, actionable, sanitized intelligence to cyber incident response professionals.
Leverages technical knowledge of computer systems and networks with cyber threat information to assess the client's security posture.
Conducts intelligence analysis to assess intrusion signatures, tactics, techniques, and procedures associated with preparation for and execution of cyber attacks.
Researches hackers, hacker techniques, vulnerabilities, exploits, and provides detailed briefings and intelligence reports to leadership.
Qualifications
Bachelor's with 2-5 years (or commensurate experience)
Required Skills and Experience
Clearance Required: Secret
Delivering cybersecurity support in Do D, military, or government classified environments to manage security operations, compliance, and risk mitigation
Implementing and managing cybersecurity controls, vulnerability assessments, incident response, and security monitoring on classified networks or secure Do D systems
Applying Do D cybersecurity policies and frameworks (e.g., RMF, NIST standards, or equivalent) to achieve and maintain system accreditation and authorization
Preferred Skills and Experience
Hands-on cybersecurity operations, or compliance on CENTRIXS-K (CX-K) or similar bilateral/multinational coalition networks in U. S./ROK or Do D coalition settings
Implementing security controls, RMF accreditation processes, continuous monitoring, and audit compliance for classified military systems such as CENTRIXS-K or other Do D coalition enclaves