Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy, and consent to receive emails from Rise
Jobs / Job page
Cybersecurity Intrusion Detection Analyst image - Rise Careers
Job details

Cybersecurity Intrusion Detection Analyst

Overview

Bowhead is seeking a Cybersecurity Intrusion Detection Analyst to join our team in Dayton, OH. The Cybersecurity Intrusion Detection Analyst utilizes data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats. They provide on-site 24x7x365 operational support in the form of event/incident handling and analysis capability to cybersecurity service subscribers. These highly skilled individuals will work in various capacities alongside Warning Intelligence Analysts and Engineers. The Cybersecurity Intrusion Detection Analyst will work in the Attack Sensing and Warning (AS&W) division which senses changes in subscriber networks through comparison to established baselines and the fusion/integration of closed and open source intelligence to enhance sensing capability. They will perform the analysis of disparate data sources to form a cohesive view of the current cyber security state. They will characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. These positions are in a 24x7x365 Cybersecurity environment and qualified candidates must be able to work 12 hour shifts - day or night.

 

 

Responsibilities

  • Proactively analyzes network and systems traffic, event logs, and threat intelligence data, to properly identify and triage susceptibility of core campus technical assets, determine likelihood of exploitation and implement and/or refine preventative and detective security controls
  • Participates in the development and monitoring of policies and procedures for department or department operations.
  • Assesses, analyzes, and consults on the security of information assets - networks, endpoints, databases, applications, services, platforms, environments, etc. Contributes to asset inventory and categorization processes."
  • Receive and distribute AS&W information;
  • Conduct AS&W activities to develop appropriate response (receives and archive task orders, directives, and other required actions,
  • Maintain internal and external source location information);
  • Coordinate AS&W information from other sources to aid in analysis of alerts.
  • Analyze the Intrusion Detection System alerts to identify unauthorized or anomalous activity.
  • Identify, documents, and reports unauthorized activity/attacks (including IP addresses and ports, attack vector, and attack timeframe) in all incidents and reports per HPCMP CSSP sops.
  • Take action, if appropriate, to prevent or mitigate potential impact to the DODIN based on cyber threats, and develop and distribute countermeasures and interim guidance to prevent or mitigate threats and/or attacks on DODIN.
  • Monitor a platform capable of performing information security continuous monitoring (ISCM) for the purposes of detecting cyber intrusions, attacks, anomalous behavior, and possible insider threats.
  • Collect intrusion artifacts (e.g., source code, malware, and trojans)
  • Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
  • Report incidents and events within proper channels and within timelines identified in the CJCSM 6510.01B
  • Provide a 24/7x365 event/incident handling and analysis capability;
  • Provide operations log accessible to personnel documenting all mandated reportable cyber events/incidents;
  • Analyze detected cyber events to identify incidents;
  • Categorize and characterize cyber incidents;
  • Notify affected Subscribers of cyber incidents and collect assessments of mission impact for the loss of the system during the incident response process;
  • Analyze cyber incidents to develop specific responses;
  • Distribute tailored countermeasures or interim guidance to Subscribers to eradicate and prevent cyber incidents across all subscribers;
  • Perform forensic analysis of systems and malware in cases where subscribers lack the capability and ensure relevant IOCs are shared with Warning Intelligence;
  • Mitigate operational and/or technical impact due to cyber incidents;
  • Contain the spread of malware to prevent further damage to IT systems through detection, analysis, and execution of containment measures.

Qualifications

  • Must possess Bachelor's degree or equivalent experience.
  • Must have at least 5 years intrusion detection experience.
  • Must have at least 2 years relevant IT and/or System administrator experience and 3 years relevant Information Security experience
  • Must have the certifications for DOD 8570 IAT Level II minimally.
  • Must have the certifications for DOD 8570 CSSP-Analyst or CSSP-Incident Responder.
  • Must have the ability to earn DoD 8570 computing environment certification within 6 months.
  • Understanding of network hardware devices and experience configuring Access Control Lists or other Firewall or Router configuration experience
  • Ability to demonstrate strong knowledge of computer security concepts
  • Ability to communicate effectively, interpret regulatory guidance and identified vulnerabilities to a wide audience.
  • Advanced knowledge of network technologies and protocols
  • Advanced understanding of current threats and trends present in the Information Security and Technology field
  • Must complete the specified Joint Qualification Requirement training within 180 days of date of hire, unless otherwise specified.

 

SECURITY CLEARANCE REQUIRED: Must currently hold and be able to maintain an active Secret clearance. US Citizenship is a requirement for Secret clearance at this location.

 

Physical Demands: • Must be able to lift up to 25 pounds • Must be able to stand and walk for prolonged amounts of time• Must be able to twist, bend and squat periodically

 

#LI-MN1

Average salary estimate

$80000 / YEARLY (est.)
min
max
$70000K
$90000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Intrusion Detection Analyst, Bowhead

Are you ready to dive into the world of cybersecurity? Bowhead is on the lookout for skilled Cybersecurity Intrusion Detection Analysts to join our dynamic team at Wright Patterson AFB in Dayton, OH! In this pivotal role, you will utilize a variety of cyber defense tools, such as IDS alerts and network traffic logs, to detect and analyze events that could pose a threat to our environments. Your expertise will help mitigate risks, ensuring the safety of our cyber landscape. As a Cybersecurity Intrusion Detection Analyst, you will provide essential 24/7 operational support, collaborating closely with Warning Intelligence Analysts and Engineers to monitor and respond to potential security incidents. Your sharp analytical skills will be crucial in characterizing network traffic and identifying anomalies. If you thrive in a fast-paced environment and are eager to help safeguard our digital assets, then this is the perfect opportunity for you! We are committed to maintaining a secure atmosphere, and you will be at the forefront of that mission. This role does involve working 12-hour shifts, day or night, but the impact you will have on keeping our systems secure will make it all worthwhile. So, if you have the experience, certifications, and passion for cybersecurity, we want to hear from you!

Frequently Asked Questions (FAQs) for Cybersecurity Intrusion Detection Analyst Role at Bowhead
What are the main responsibilities of a Cybersecurity Intrusion Detection Analyst at Bowhead?

As a Cybersecurity Intrusion Detection Analyst at Bowhead, your primary responsibilities include analyzing network and systems traffic, monitoring IDS alerts, and assessing the security of various information assets to identify any unauthorized activity. You'll work closely with other analysts to develop appropriate incident responses and maintain an ongoing state of readiness in monitoring threats. Your proactive approach will be crucial to ensuring a robust cybersecurity environment.

Join Rise to see the full answer
What qualifications do I need to apply for the Cybersecurity Intrusion Detection Analyst position at Bowhead?

To qualify for the Cybersecurity Intrusion Detection Analyst role at Bowhead, candidates must possess at least a Bachelor's degree or equivalent experience, along with a minimum of 5 years of intrusion detection experience. Relevant IT/system administration experience is also necessary. Additionally, candidates should hold certifications for DOD 8570 IAT Level II and CSSP-Analyst or CSSP-Incident Responder. A Secret clearance is also required, so US Citizenship is a must.

Join Rise to see the full answer
What skills are essential for a Cybersecurity Intrusion Detection Analyst at Bowhead?

Essential skills for a Cybersecurity Intrusion Detection Analyst at Bowhead include advanced knowledge of network technologies and protocols, strong analytical abilities to identify and triage threats, and excellent communication skills for interpreting regulatory guidance. A solid understanding of computer security concepts and the capability to work effectively in a team-oriented, fast-paced environment are also critical.

Join Rise to see the full answer
Does the Cybersecurity Intrusion Detection Analyst role require working night shifts at Bowhead?

Yes, the Cybersecurity Intrusion Detection Analyst position at Bowhead requires candidates to work 12-hour shifts, including night shifts. This is essential to provide continuous 24/7 operational support to monitor and respond to cybersecurity incidents effectively, ensuring the safety and integrity of our systems at all times.

Join Rise to see the full answer
What is the work environment like for a Cybersecurity Intrusion Detection Analyst at Bowhead?

The work environment for a Cybersecurity Intrusion Detection Analyst at Bowhead is dynamic and supportive, characterized by a commitment to teamwork in a 24x7 cybersecurity operation. Analysts are encouraged to collaborate with colleagues, such as Warning Intelligence Analysts and Engineers, to mitigate threats proactively while utilizing cutting-edge cyber defense tools. The role requires dedication and adaptability to ensure the highest security standards.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Intrusion Detection Analyst
Can you describe your experience with intrusion detection systems?

When answering this question, detail your previous experience with specific intrusion detection systems you've worked with, including how you've used them to analyze and respond to threats. Highlight any significant incidents you've managed, emphasizing your analytical skills and your role in incident response.

Join Rise to see the full answer
What steps would you take to analyze a suspected security incident?

Respond by outlining a systematic approach, starting from initial detection using monitoring tools, followed by analyzing relevant logs and data. Discuss your process for identifying potentially malicious activity, coordinating with team members, and documenting findings to ensure thorough incident management.

Join Rise to see the full answer
How do you stay updated on current cybersecurity threats and trends?

Discuss various resources you utilize to remain informed, such as industry news, cybersecurity blogs, or professional associations. Mention any relevant certifications or training programs you're currently pursuing to enhance your knowledge and keep pace with evolving threats.

Join Rise to see the full answer
What is your approach to working under pressure in a high-stakes environment like cybersecurity?

Explain your strategies for managing stress, such as prioritizing tasks, maintaining clear communication with team members, and focusing on effective problem-solving. Sharing examples of past experiences can illustrate how you have successfully navigated high-pressure situations.

Join Rise to see the full answer
Can you give an example of a time you identified a vulnerability and how you addressed it?

Provide a specific example, detailing the steps you took to identify the vulnerability, how you assessed its potential impact, and the measures you implemented to mitigate the risk. Emphasize your analytical methodologies and collaborative efforts made during this process.

Join Rise to see the full answer
What do you consider the most critical aspect of a cybersecurity incident response plan?

Discuss the importance of having a clear communication protocol within the incident response plan to ensure that all team members and relevant stakeholders are immediately informed. Mention how this aids in quick decision-making and efficient incident management.

Join Rise to see the full answer
What certifications do you currently hold that are relevant to the Cybersecurity Intrusion Detection Analyst position?

Enumerate any cybersecurity-related certifications you hold, such as CISSP, CEH, or those specific to DOD 8570, such as IAT Level II or CSSP-Analyst. Explain how these certifications contribute to your expertise and preparedness for the role.

Join Rise to see the full answer
What tools do you find most effective for threat analysis?

Share specific tools you're experienced with, such as SIEM solutions, threat intelligence platforms, or forensics software. Explain why you find these tools effective and how you've used them in your past roles to enhance threat detection and response.

Join Rise to see the full answer
How would you describe your communication skills in relation to explaining technical concepts?

Highlight your capacity to communicate complex technical issues in an understandable manner to both technical and non-technical audiences. Provide examples of how you've successfully explained vulnerabilities or incidents to stakeholders in the past.

Join Rise to see the full answer
Can you describe a scenario where you had to collaborate with other teams during a cybersecurity incident?

Detail your experience in a collaborative effort during a cybersecurity incident, focusing on how you coordinated with different teams, the types of communication you utilized, and the outcome of that cooperation. Stress the importance of teamwork in effective incident response.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 14 days ago

Join Palo Alto Networks as an Inside Systems Engineer and contribute to protecting digital lives with innovative cybersecurity solutions.

Utilize your technical expertise to enhance operations at the University of Texas at Austin as a Senior Computer Operations Specialist in a hybrid role.

Photo of the Rise User
Posted 9 days ago

Join Panopto as a Business Systems Manager to drive the effectiveness of our Revenue Operations team through strategic leadership and operational excellence.

Posted 3 days ago

Take the lead in defining Walgreens' enterprise architecture direction and strategy across global platforms as the Director of Senior Enterprise Architecture.

Photo of the Rise User
Posted 11 days ago

As a Cybersecurity Analyst at Doma Technology LLC, you will play a pivotal role in enhancing security measures for the organization while embracing a culture of curiosity and learning.

Photo of the Rise User

Join Ellucian as a Director of Application Services, leading the support and optimization of their Colleague ERP system for Victor Valley College.

Photo of the Rise User
American Express Hybrid Phoenix, Arizona, United States
Posted 2 days ago
Inclusive & Diverse
Empathetic
Collaboration over Competition
Growth & Learning
Transparent & Candid
Medical Insurance
Dental Insurance
Mental Health Resources
Life insurance
Disability Insurance
Child Care stipend
Employee Resource Groups
Learning & Development

Join American Express as a Cloud & SaaS Security Program Manager, where you'll lead security initiatives in their cloud transformation journey.

Posted 11 days ago

Storable is looking for a Salesforce Admin to deliver system optimization and user support for its powerful property management platform.

Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Rapid Growth
Passion for Exploration
Dare to be Different
Dental Insurance
Life insurance
Health Savings Account (HSA)
Disability Insurance
Flexible Spending Account (FSA)
Vision Insurance
Mental Health Resources
401K Matching
Paid Time-Off
Snacks
Photo of the Rise User
Inclusive & Diverse
Empathetic
Collaboration over Competition
Mission Driven
Social Impact Driven
Diversity of Opinions
Growth & Learning
Photo of the Rise User
Inclusive & Diverse
Rise from Within
Mission Driven
Diversity of Opinions
Work/Life Harmony
Transparent & Candid
Growth & Learning
Fast-Paced
Collaboration over Competition
Take Risks
Friends Outside of Work
Passion for Exploration
Customer-Centric
Reward & Recognition
Feedback Forward
Rapid Growth
Medical Insurance
Paid Time-Off
Maternity Leave
Mental Health Resources
Equity
Paternity Leave
Fully Distributed
Flex-Friendly
Some Meals Provided
Snacks
Social Gatherings
Pet Friendly
Company Retreats
Dental Insurance
Life insurance
Health Savings Account (HSA)
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
No info
HQ LOCATION
No info
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
April 18, 2025

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!
LATEST ACTIVITY
Photo of the Rise User
Someone from OH, Marysville just viewed Security Specialist at Anduril Industries
Photo of the Rise User
Someone from OH, Cincinnati just viewed Learning Content Designer at QuantHub
Photo of the Rise User
Someone from OH, Tallmadge just viewed Manufacturing and Process Engineer at CVRx
Q
Someone from OH, Columbus just viewed Part-Time Medical Assistant at QualDerm Partners
Photo of the Rise User
Someone from OH, Cincinnati just viewed Summer 2025 Intern – Finance – Michigan at Stryker
Photo of the Rise User
19 people applied to SOC Analyst I at CBIZ
Photo of the Rise User
Someone from OH, Cleveland just viewed Remote Customer Service Representative at Conduent
Photo of the Rise User
Someone from OH, Cleveland just viewed Customer Support Team Lead (6-month Contract) at Jane App
o
Someone from OH, Cincinnati just viewed Marketing and Communications Consultant at osu