Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

Jacobs Cyber Defense Analyst (Wireless) 2 - TS/SCI w/Poly in Fort Meade, Maryland

Your Impact:

Jacobs is seeking a Cyber Defense Analyst (Level 2) for a sub-contract.

Responsibilities:

  • Use cyber defense tools to monitor, detect, analyze, categorize, and perform initial triage of anomalous activity.

  • Generate cybersecurity cases (including event’s history, status, and potential impact for further action) and route as appropriate.

  • Leverage knowledge of commonly used network protocols and detection methods to defend against related abuses.

  • Apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation).

  • Perform advanced manual analysis to hunt previously unidentified threats

  • Conduct PCAP analysis.

  • Identify cyber-attack phases based on knowledge of common attack vectors and network layers, models and protocols.

  • Apply techniques for detecting host- and network-based intrusions.

  • Working knowledge of enterprise-level network intrusion detection/prevention systems and firewall capabilities.

  • Understand the foundations of a hardened windows network and what native services and protocols are subject to abuse (such as RDP, Kerberos, NTLM, WMI, and SMB).

  • Familiarity with fragmentation of network traffic and how to detect and evaluate fragmentation related attacks in raw packet captures.

  • Conduct network – traffic, protocol and packet-level – and netflow analysis for anomalous values that may be security-relevant using appropriate tools (such as Wireshark, tshark, tcpdump).

  • Understand snort filters and how they are crafted and tuned to feed IDS alerting.

  • Understand system and application security threats and vulnerabilities to include buffer overflow, SQL injection, race conditions, covert channel, replay and return-oriented attacks, malicious code and malicious scripting.

  • Analyze malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.

  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.

  • Familiar with indications of Command and Control (C2) channels and what strategies attackers use to bypass enterprise defenses from a compromised host.

#dvscyber

#divergent

Here’s what you’ll need :

  • Requires DoD 8570 compliance with CSSP Analyst baseline certification.

  • Information Assurance Technical (IAT) Level I or Level II certification.

  • Computing Environment (CE) certification. The CE certification requirements can be fulfilled with either Microsoft OS, Cent OS/Red Hat OS CE certifications.

  • Requires successful completion of the Splunk software training course “Fundamentals 1”.

  • Wireless certification similar to Certified Wireless Network Administrator (CWNA) to Assessing and Auditing Wireless Networks (GAWN), Certified

  • Wireless security Professional (CWSP), Offensive Security Wireless Fidelity (OSWP), Cisco Certified Network Associate (CCNA-Wireless), Or Cisco Certified Network Professional (CCNP-Wireless).

  • Four (4) years of demonstrated experience as CDA in programs and contracts of similar scope, type, and complexity required. A technical bachelor's degree from an accredited college or university may be substituted for two (2) years of CDA experience on projects of similar scope, type, and complexity.

  • One (1) year of demonstrated and practical experience in TCP/IP fundamentals.

  • One (1) year of demonstrated experience with Bricata, tcpdump or Wireshark

  • Two (2) years of demonstrated experience using security information and event management suites (such as Splunk, ArcSight, Kibana, LogRhythm).

  • Two (2) years of demonstrated experience in network analysis and threat analysis software utilization

  • Two (2) years of demonstrated experience maintaining or managing Cloud environments such as Microsoft Azure, Amazon Web Services (AWS), using tools like Microsoft Sentinel.

  • Ability to work shift work is essential.

Jacobs is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, religion, creed, color, national origin, ancestry, sex (including pregnancy, childbirth, breastfeeding, or medical conditions related to pregnancy, childbirth, or breastfeeding), age, medical condition, marital or domestic partner status, sexual orientation, gender, gender identity, gender expression and transgender status, mental disability or physical disability, genetic information, military or veteran status, citizenship, low-income status or any other status or characteristic protected by applicable law. Learn more about your rights under Federal EEO laws and supplemental language.

DirectEmployers