Host Based Systems Analyst II
Company: Solutions³ LLC
Location: Arlington
Posted on: February 19, 2026
|
|
|
Job Description:
Job Description Job Description Title: Host Based Systems
Analyst II Description: Solutions³ LLC is supporting our prime
contractor and their U.S. Government customer on a large
mission-critical provide remote and onsite advanced technical
assistance, proactive hunting, rapid onsite incident response, and
immediate investigation and resolution using host-based,
network-based, and cloud-based cybersecurity analysis capabilities.
Personnel provide front line response for digital
forensics/incident response (DFIR) and proactively hunting for
malicious cyber activity. Solutions³ LLC is seeking Cyber Network
Defense Analysts (CNDA) to support this critical customer mission.
Eligibility: Must be a US Citizen Must have an active TS/SCI
clearance Must be able to obtain DHS Suitability prior to starting
employment 5 years of direct relevant experience in cyber defense
analysis using leading edge technologies and industry standard
cyber defense tools Responsibilities Include: The majority of the
CNDA’s time (75%) will be spent executing the following tasks:
Characterize and analyze network traffic to identify anomalous
activity and potential threats to network resources Coordinate with
enterprise-wide cyber defense staff to validate network alerts
Document and escalate incidents (including event's history, status,
and potential impact for further action) that may cause ongoing and
immediate impact to the environment Perform cyber defense trend
analysis and reporting Perform event correlation using information
gathered from a variety of sources within the enterprise to gain
situational awareness and determine the effectiveness of an
observed attack Provide daily summary reports of network events and
activity relevant to cyber defense practices Receive and analyze
network alerts from various sources within the enterprise and
determine possible causes of alerts Provide timely detection,
identification, and alerting of possible attacks/intrusions,
anomalous activities, and misuse activities and distinguish these
incidents and events from benign activities Use cyber defense tools
for continual monitoring and analysis of system activity to
identify malicious activity Analyze identified malicious activity
to determine weaknesses exploited, exploitation methods, effects on
system and information Determine tactics, techniques, and
procedures (TTPs) for intrusion sets Examine network topologies to
understand data flows through the network Identify and analyze
anomalies in network traffic using metadata Conduct research,
analysis, and correlation across a wide variety of all source data
sets (indications and warnings) Validate intrusion detection system
(IDS) alerts against network traffic using packet analysis tools
Identify applications and operating systems of a network device
based on network traffic Reconstruct a malicious attack or activity
based off network traffic Identify network mapping and operating
system (OS) fingerprinting activities Assist in the construction of
signatures which can be implemented on cyber defense network tools
in response to new or observed threats within the network
environment or enclave Notify designated managers, cyber incident
responders, and cybersecurity service provider team members of
suspected cyber incidents and articulate the event's history,
status, and potential impact for further action in accordance with
the organization's cyber incident response plan Approximately 25%
of the CNDA’s time will be spent executing the following tasks:
Prepare and update manuals, instructions, and operating procedures
Evaluate established methods and procedures and prepare
recommendations for changes in methods and practices where
appropriate Plan and carry out difficult and complex assignments
and develop new methods, approaches, and procedures Conduct
analyses and recommend resolution of complex issues affecting the
specialty area Ensure optimal use of commercially available
products Prepare and present reports Evaluate the effectiveness of
installed systems and services Required Skills: Experience
successfully developing and deploying signatures Experience
detecting host and network-based intrusions via intrusion detection
technologies (e.g., Snort) Experience implementing incident
handling methodologies Experience implementing protocol analyzers
Experience collecting data from a variety of cyber defense
resources Experience reading and interpreting signatures (e.g.
snort) Experience performing packet-level analysis Experience
conducting trend analysis Desired Skills: GSEC (SANS401), Arcsight
(or other SEIM solution), Network, Security and Python programming
experience would be ideal. Strong math and science background.
Experience with Carnegie Mellon SiLK tool suite. Desired
Certifications: One or more of the following certifications: GNFA,
GCIH, GCIA, GSEC, CASP, CySA, PaLMS, FedVTE Required Education: BS
in Computer Science, Cybersecurity, Computer Engineering or related
degree; or HS Diploma and 7 years of network investigations
experience Powered by JazzHR lQRYdDUOj4
Keywords: Solutions³ LLC, Leesburg , Host Based Systems Analyst II, IT / Software / Systems , Arlington, Virginia