Cyber Analyst

Apply now »

Date: Nov 12, 2017

Location: Herndon, VA, US, 21090

CenturyLink (NYSE: CTL) is a global communications and IT services company focused on connecting its customers to the power of the digital world. CenturyLink offers network and data systems management, big data analytics, managed security services, hosting, cloud, and IT consulting services. The company provides broadband, voice, video, advanced data and managed network services over a robust 265,000-route-mile U.S. fiber network and a 360,000-route-mile international transport network. Visit CenturyLink for more information.

Job Summary

Designs, tests and implements state-of-the-art secure operating systems, networks, and database products.  Conducts risk assessment and provides recommendations for application design.  Involved in a wide range of security issues including architectures, firewalls, electronic data traffic, and network access.  Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.  May prepare security reports to regulatory agencies.

Job Description

 Preferred Background/Engagement Description

•General Experience. Eight (8) years of experience LANs, WANs, VPNs, firewalls and other security and network devices. Capable of assessing and evaluating new IA and network technologies and IA-enabling products. Experience leading a team, developing and following team procedures.
•IA Specialized Experience. Four (4) years of experience network monitoring, intrusion detection, reactive measures and prevention, security assessment methodologies, security vulnerability analysis, data encryption, IA Tools and SOC operations. Knowledge of Cyber Threats and mitigation strategies, TCP/IP, packet capture, scripting, IPS and IDS signatures. Systems analysis experience designing technical applications on computer systems.
•Forensics Experience. Experience with Encase or similar forensics tool, as an Incident Handler, Forensics Analyst or Reverse Engineer.  Strong background fusing technical exploitation into all source intelligence products Experience or formal training in Biometric/Forensic Systems, collections, and databases/architecture Experience or formal training in Biometric/Forensic Systems, collections, and databases/architecture.  Extensive knowledge of how Technical Exploitation enables the Intelligence Cycle.

 Conduct detailed analysis of intrusions and malware:

•Performs forensic analysis of digital information and physical evidence.
•Provides specialized support by gathering, handling, examining, preparing, entering, and searching, retrieving, identifying and/or comparing digital and/or physical evidence.
•Uses forensically sound procedures to determine results.
•Observes proper evidence custody and control procedures, documents procedures and findings and prepares comprehensive written notes and reports.
•Develops, researches, and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding, and encryption
•Utilizes software applications for the analysis and processing of digital images.
•Hands on experience in an Offensive Security Shop

 Role Description:

•Perform as a member of an interdisciplinary team in a Managed Security Solution (MSS) Cyber Security Operations Center (CSOC) providing 24/7 support operations, cyber security monitoring, and customer support. Job normally works day shift but may require shift work to cover gaps as the mission requires.  Perform network vulnerability analysis and reporting. Perform network security monitoring and analysis, identifies suspicious and malicious activities, identifies and tracks malicious code (including worms, viruses, Trojan horses, etc), enters and tracks events and incidents. Supports incident escalation and assesses probable impact and damages, identifies damage control, assists in developing course of action and recovery procedures. Knowledge of LANs, VPNs, Routers, firewalls, Applies knowledge of current IA policy at the national IA structure, roles of major organizations how they interrelate and interact, and shortcomings in this structure. Reviews and recommends IA solutions to customer problems based on an understanding of how products and services interrelate and support the IA mission and the viewpoints of the consumers of those products and services. Analyzes and recommends resolution of IA problems based on knowledge of the major IA products and services, an understanding of their limitations, and a working knowledge of the disciplines of IA. Meet or exceed Corporate and Customer goals and objectives.




Technical Qualifications

Technical Environment:

•QRadar, UNIX/Linux, Microsoft Windows Server, Exchange, Active Directory, TCP/IP, firewalls, VPN, IDS/IPS
•Familiarity with relevant security requirements documents such as STIGS
•SOC/CSOC/NOSC experience
•MCSE/MCITP, CCSP/CCNP Security, CCNA Security, GCIA, GCIH, GREM, Certified Ethical Hacker, or equivalent
•Moderate understanding of Python (pandas, Scikit-learn, Numpy, theano)
•Data science analytics experience
•CISSP, GIAC Certified Enterprise Defender
•Information Security Professional, Cisco CCNP Security
•Certified Ethical Hacker (CEH).

Alternate Location: US-Colorado-Denver; US-Virginia-Herndon

Requisition #: 155808

This job may require successful completion of an online assessment. A brief description of the assessments can be viewed on our website at 

EEO Statement

We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”).  We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.


The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job.  Job duties and responsibilities are subject to change based on changing business needs and conditions.

Nearest Major Market: Baltimore

Job Segment: Network Security, Cyber Security, Cisco, Consulting, Engineer, Security, Technology, Engineering

Apply now »

Share this Job