NetCentrics Corporation
  • 16-Dec-2021 to Until Filled (EST)
  • Sierra Vista, AZ, USA
  • Salary
  • Full Time
  • TS/SCI


Title: Forensics Malware Senior Analyst

Location: Fort Huachuca, AZ

Clearance: TS/SCI


  • Provide technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems
  • Design, develop, and implement security requirements within an organization's business processes
  • Prepare documentation from information obtained from customer using accepted guidelines such as DITSCAP (DoD Information Technology Security Certification and Accreditation Process)
  • Prepare Security Test and Evaluation plans
  • Provide certification and accreditation support in the development of security and contingency plans and conduct complex risk and vulnerability assessments
  • Analyze policies and procedures against Federal laws and regulations and provide recommendations for closing gaps
  • Develop and complete system security plans and contingency plans
  • Recommend system enhancements to improve security deficiencies
  • Develop, test and integrate computer and network security tools
  • Secure system configurations and install security tools, scans systems in order to determine compliance and reports results, and evaluate products and various aspects of system administration
  • Conduct security program audits and develop solutions to lessen identified risks
  • Develop strategies to comply with privacy, risk management and e-authentication requirements
  • Provide information assurance support for the development and implementation of security architectures to meet new and evolving security requirements
  • Evaluate, develop and enhance security requirements, policy and tools
  • Provide assistance in computer incident investigations
  • Perform vulnerability assessments including development of risk mitigation strategies
  • Conduct and document security risk threat assessments, prepare recommendations for countermeasures
  • Participate in engineering, customer and/or business meetings
  • Travel to remote locations in support of business objectives
  • Provide review and writing support on technical data packages and documentation
  • Support, communicate, reinforce and defend the mission, values and culture of the organization
  • Follow ARCYBER requirements
  • Use CIAP Forensic and Malware procedures for maintaining handling of media during analysis and incidents investigation activities
  • Provide defensive measures to protect and defend information, computers and networks from disruption, denial, degradation or destruction
  • Provide sensor management and event analysis and response for network and host-based events
  • Provide management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet enterprise traffic to detect sensor outages and malicious threat attacks that attempt to compromise the confidentiality, integrity, or availability of the network
  • Initiate defensive security procedures upon detection of attacks
  • Reduce incidents to actual malicious threat determinations and mitigate those threats in accordance with (IAW) guidance received from the incident handlers
  • Capture and perform initial analysis on captured volatile data, log data, captured network traffic data, etc., to identify any immediate intrusion related artifacts which in turn will allow immediate defensive countermeasures to be implemented
  • Develop necessary procedures or scripts to identify intrusion artifacts
  • Work and interact with other DCO professionals internal and external to Army Cyber Command, with Law Enforcement and Counter Intelligence LNO's, and intelligence professionals as a technical specialist to understand higher-level adversary capability
  • Document, update and enhance processes and procedures by producing training materials, standards documents and reports


  • Master's degree in Computer Science or related technical field and 10+ years of applicable information systems experience; or equivalent combination of work experience in related technical field
  • Active DoD TS/SCI security clearance


  • GIAC Certified Forensic Analyst (GCFA)
  • DoD 8570 IAT Level II Baseline Certification

Preferred Skillset/Qualifications:

  • CCIU LogCollector
  • EnCase Enterprise / Cybersecurity
  • AccessData eDiscovery
  • Mandiant Redline, Tanium
  • Experience with Windows OS platforms such as Windows 7/8/10 and Server 2K3/2K8/2012/2016
  • Experience with Unix/Linux platforms and Apple based operating systems
  • Several years of experience in the area of Forensics/ Malware Analysis
  • Certified Information Systems Security Professional (CISSP) certification

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran status or on the basis of disability.

Equal Opportunity Employer/Veterans/Disabled.

NetCentrics Corporation
  • Apply Now

    with our quick 3 minute Application!

  • * Fields Are Required

    What is your full name?

    How can we contact you?

  • Sign Up For Job Alerts!

  • Share This Page
  • Facebook Twitter LinkedIn Email
logo About Us Contract Vehicles Contact Us Our Expertise Who We Serve Our Next 25 Culture and Careers News and Insights