starweaver-logo
LOG INGET STARTED
LOG INGET STARTED
  • Browse
  • Doing

  • On Air
  • Channels
  • Career Paths
  • LEARNING

  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • CONNECTING

  • How It Works
  • Community
  • Techbytes
  • Podcasts
  • Leaderboards
  • SUPPORT

  • Support & FAQs
  • Starweaver for Business
  • Starweaver for Campus
  • Teach with Starweaver
footer-brand-logo
  • COMPANY
  • About Us
  • Support and Knowledge Base
  • Policies & Terms
  • Contact
  • CONTENT
  • Courses
  • Certifications
  • Journeys
  • Test Prep
  • Meet the Gurus
  • Techbytes
  • FOR ORGANIZATIONS
  • Starweaver for Business
  • Starweaver for Campus
  • Catalogue
  • Pricing
  • Private Classes
  • PARTNER WITH US
  • Instructors & Teachers
  • Books, Writing & Publishing
  • FOLLOW US
    • facebook
    • twitter
    • linkedin
    • pinterest
    • instagram
    • youtube
Our trademarks include Starweaver®, Make genius happen™, Education you can bank on®, People are your most important assets!®, Body of Knowledge™, StarLabs™, LiveLabs™, Journeys™
© Starweaver Group, Inc. All Rights Reserved.
  1. Job Roles
  2. >
  3. Cyber Operations Specialist

Cyber Operations Specialist

What does a professional in this career do?

As a Cyber Operations Specialist, you’ll utilize invaluable skills to defend the Army’s crucial and complex weapons systems, which include satellites, navigation, and aviation systems against both foreign and domestic cyber threats. As one of the most technologically advanced nations in the world, our adversaries are attacking and attempting to exploit our networks around the clock, searching for vulnerabilities. You’ll respond to these attacks while enabling commanders to gain an advantage in cyberspace across all domains by targeting enemy activities and capabilities.

In this job you will...

  • Provide advanced cybersecurity analytics (ACA) services that aggregate and analyzes products, data, and information to identify trends and patterns, anomalous activity, provide situational awareness of the customer's networks, missions, and threats, and provide operational recommendations, visualizations, tuning requests, and custom signature creation to the CSOC and other internal and external stakeholders.
  • Provide cyber threat intelligence services for the collection, fusion, analysis, creation, and distribution of threat intelligence from government entities, commercial feeds, open sources, and other partners to obtain situational awareness of the threat environment.
  • Cyber threat intelligence services shall develop and disseminate reports and tippers to internal and external stakeholders based on events, alerts, and incidents on customer systems and networks.
  • Cyber Threat Intel Services - Provide cyber threat intelligence services on an expanded 12x5 service support level during core hours and on-call support with a two-hour response time during non-core hours.
  • Cyber Tier 1 will provide on-site expanded 24x7 Services at the customer site.
  • Advanced Cybersecurity Analytics will provide advanced cybersecurity services on an expanded 12x5 service support level during core hours and on-call support with two-hour response time during non-core hours.
  • Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
  • Designs and implements data network security measures; operate Network Intrusion Detection and Forensics; conduct performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
  • Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.

Skills You Will Gain

advanced cybersecurity analytics (ACA)
Cyber
DR
Operations
visualizations

Representative Journeys

Foundations of Cybersecurity
Foundations of CybersecurityKevin Cardwell | Cybersecurity | 3 hrs and 30 mins

Launch Journey

analyzing-and-defending-networks-with-wireshark
Analyzing and Defending Networks with Wireshark
Kevin CardwellSkills: HackingTCP/IPWireshark

Journey Completed

Related roles

Computer Network Support Specialists

Computer Network Support Specialists

Information Systems Security Manager

Information Systems Security Manager

Information Security Engineers

Information Security Engineers

Alternative job titles

  • Certified Tester
  • Consulting Advisory Tester
  • Cyber Assessment Tester
  • Cyber Assessor
  • Cyber Security Engineer
  • Cyber Security Tester
  • Cyber Tester
  • Embedded Tester
  • Forensic Analysis Tester

SOME OF THE INSTRUCTORS AND EXPERTS SUPPORTING YOU ON THESE JOURNEYS

Analyzing and Defending Networks with Wireshark

Analyzing and Defending Networks with Wireshark