Abile Headquarters

  • CSOC Analyst

    Job Locations US-VA-Springfield
    Posted Date 2 days ago(7/13/2018 8:41 PM)
    Job ID
    # of Openings
    Information Technology
  • Overview

    Abile Group has an exciting and challenging opportunity for a CSOC Analyst supporting an Intelligence Community Customer on an Enterprise Management and Cyber Security outsourcing contract.


    Abile Group, Inc. was formed in July 2004 to partner with the Intelligence Community and their Contractors in the areas of Enterprise Analytics & Performance Management, IT & Systems Engineering and Program & Project Management. We have significant experience with the Federal Government and are an EDWOSB dedicated to our employees and clients. We are looking for high performing employees who enjoy providing advice and guidance along with solutions development and implementation support, crafted by combining industry best practices with the clients’ subject matter experience and Abile’s breadth of expertise. Abile Group is an Equal Opportunity Employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, veteran status, disability, or national origin.


    The right candidate will possess the following skills and capabilities and be ready to handle all responsibilities independently and professionally.


    • Under broad direction, operates and manages all aspects of Information Systems, data availability, integrity, authentication, confidentiality, and non-repudiation.
    • Implements and monitors security measures for communication systems, networks, and provide advice that systems and personnel adhere to established security standards and Governmental requirements for security on these systems.
    • Develops and executes security policies, plans, and procedures; designs and implements data network security measures; operates Network Intrusion Detection and Forensics; conducts performance analysis of Information Systems security incidents; develops Continuity of Operation (COOP)/Disaster Recovery (DR) plans and supports certification of Information Systems and Networks.
    • Supervises operation of Electronic Key Management System, other information security duties, and Public Key Infrastructure.
    • Operates Host Based Security System (HBSS), firewalls, Intrusion Prevention Systems, Intrusion Detection Systems, other point of presence security tools, Virtual Private Networks, and related security operations.


    Clearance Required: TS/SCI

    Degree and Years of Experience: Bachelor’s degree or equivalent plus 3 years of experience

    Shift: 24x7 (0600-1800; 1800-0600)

    Required Certifications: CND-A: GCIA, GCIH, CEH, SCYBER


    Required Skills:

    •  Must possess strong organizational, analytical and attention to detail skills
    • Must have the ability and prior experience with analyzing information technology security events to discern
      events that qualify as a legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a computer system as well identification of malicious activities present within a computer system and/or enterprise network.
    •  Must have experience working with a ticket management system to collect, document and maintain information
      pertinent to security investigations and incidents
    • Must possess excellent verbal and written communications skills and ability produce clear and thorough security
      incident reports and briefings
    • Must possess experience in monitoring the operational status of monitoring components and escalating and
      reporting outages of the components
    • Must possess a working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly
        deployed in enterprise networks. A conceptual understanding of Windows Active Directory is also required.• Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP,
      BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS,etc.)
    • Must have experience working with various event logging systems and must be proficient in the review of
      security event log analysis. Previous experience with Security Information and Event Monitoring (SIEM)platforms such as Arcsight, that perform log collection, analysis, correlation, and alerting is also required.
    • Must have experience with the identification and implementation of counter-measures or mitigating controls for
      deployment and implementation in the enterprise network environment
    • Must possess experience in collecting and maintaining information pertinent to security investigations and
      incidents in a format that supports analysis, situational awareness reporting, and law enforcement investigation efforts





    EMCSS 008,054,067,204


    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed