The CDNA uses information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior. Monitoring and analysis are performed to identify and report events that occur, or might occur, within the network, in order to protect information, information systems, and networks from threats.
Responsibilities:
o Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
o Coordinate with enterprise-wide cyber defense staff to validate network alerts
o Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
o Perform cyber defense trend analysis and reporting
o Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
o Provide daily summary reports of network events and activity relevant to cyber defense practices
o Receive and analyze network alerts from various sources within the enterprise and determine possible causes of alerts
o Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities
o Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity
o Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information
o Identify and analyze anomalies in network traffic using metadata
o Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools
o Identify applications and operating systems of a network device based on network traffic
o Reconstruct a malicious attack or activity based off network traffic
o Identify network mapping and operating system (OS) fingerprinting activities
o Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave
Required Skills/Clearances:
o U.S. Citizenship
o Active TS/SCI clearance
o Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability
o 2+ years of direct relevant experience in cyber defense analysis using leading edge technologies and industry standard cyber defense tools
o Experience successfully developing and deploying signatures
o Experience detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
o Experience implementing incident handling methodologies
o Experience implementing protocol analyzers
o Experience collecting data from a variety of cyber defense resources
o Experience reading and interpreting signatures (e.g. snort)
o Experience performing packet-level analysis
o Experience conducting trend analysis
Desired Skills:
o Python programming experience
o Strong math and science background
o Experience with Carnegie Mellon SiLK tool suite
Required Education:
BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 4+ years of network investigations experience.
Desired Certifications:
· One or more of the following professional certifications: GNFA, GCIH, GCIA, GSEC, CASP+, CySA+, PaLMS, FedVTE
· GSEC (SANS401), Arcsight (or other SEIM solution), Network+, Security+
Freqently Asked Questions
Washington, VA's tech infrastructure demands that Network Based Systems Analysts stay vigilant against region-specific threats. Analysts often tailor their monitoring strategies to address local network traffic patterns and collaborate with regional cyber defense teams to enhance threat detection and incident response effectiveness.
The Washington, VA area shows a growing need for Network Based Systems Analysts due to increasing cybersecurity investments by federal contractors and private firms. Candidates with active TS/SCI clearance and experience in advanced cyber defense tools see higher hiring rates and competitive opportunities.
Network Based Systems Analysts specialize in analyzing network traffic, intrusion detection, and cyber threat signatures, requiring expertise in packet-level analysis and tools like Snort. Unlike broader IT systems analysts, they focus intensely on network security monitoring and cyber defense trend analysis.
Starting as a Network Based Systems Analyst can lead to roles such as Senior Cybersecurity Analyst, Incident Response Manager, or Cyber Defense Architect. Developing expertise in signature development, IDS/IPS technologies, and obtaining certifications like GCIH or GCIA enhances upward mobility.
Daily activities involve scrutinizing network alerts, correlating event data for threat validation, and documenting incidents for escalation. Analysts also generate reports summarizing network activity trends, continuously update detection signatures, and collaborate with cyber defense teams to maintain security posture.
Base-One Inc emphasizes proactive threat detection by integrating advanced tools and situational awareness practices. Analysts at Base-One engage in signature construction and enterprise-wide alert coordination, ensuring that their cyber defense strategies stay ahead of emerging threats.
At Base-One Inc, Network Based Systems Analysts gain hands-on experience with cutting-edge cyber defense technologies, including protocol analyzers and packet analysis tools. The company supports certification pursuits and encourages involvement in trend analysis, enhancing professional growth.
Salaries for Network Based Systems Analysts in Washington, VA typically range between $85,000 and $110,000 annually, influenced by clearance level, experience, and certifications. Given the specialized nature and clearance requirements, compensation often exceeds the national average for similar roles.
A common misunderstanding is that a bachelor's degree is mandatory; however, substantial experience in network investigations coupled with relevant certifications can suffice. Additionally, some may underestimate the importance of active security clearances and hands-on skills in signature development.
Working at Base-One Inc, a government contractor, entails stringent security protocols including TS/SCI clearance and DHS suitability. Analysts often engage in sensitive network monitoring and must adapt to compliance standards, which differentiates this experience from private sector cyber defense roles.
Popular Searches for Network Based Systems Analyst