Cyber Operations Specialist
What does a professional in this career do?
As a Cyber Operations Specialist, you’ll utilize invaluable skills to defend the Army’s crucial and complex weapons systems, which include satellites, navigation, and aviation systems against both foreign and domestic cyber threats. As one of the most technologically advanced nations in the world, our adversaries are attacking and attempting to exploit our networks around the clock, searching for vulnerabilities. You’ll respond to these attacks while enabling commanders to gain an advantage in cyberspace across all domains by targeting enemy activities and capabilities.In this job you will...
- Provide advanced cybersecurity analytics (ACA) services that aggregate and analyzes products, data, and information to identify trends and patterns, anomalous activity, provide situational awareness of the customer's networks, missions, and threats, and provide operational recommendations, visualizations, tuning requests, and custom signature creation to the CSOC and other internal and external stakeholders.
- Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
- Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on customer systems and networks.
- Cyber Threat Intel Services - Provide cyber threat intelligence services on an expanded 12x5 service support level during core hours and on-call support with a two-hour response time during non-core hours.
- Cyber Tier 1 will provide on-site expanded 24x7 Services at the customer site.
- Advanced Cybersecurity Analytics will provide advanced cybersecurity services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
- Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
- Designs and implements data network security measures; operate Network Intrusion Detection and Forensics; conduct performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
- Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
Skills You Will Gain
advanced cybersecurity analytics (ACA)
Cyber
DR
Operations
visualizations