Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Information Security Analyst (Cyber Security) - TS/SCI clearance required image - Rise Careers
Job details

Information Security Analyst (Cyber Security) - TS/SCI clearance required

Job Description:The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solutions and the integrity of our people. Explore what you can bring to our solutions in the areas of cyber, cloud and enterprise security.Be a part of the Telos culture and see what sets us apart! Telos offers an excellent compensation package with benefits that include generous paid time off, medical, dental, vision, tuition reimbursement, and 401k. Our employees enjoy more than just a great work environment!This is a contingent position upon contract being awarded.Telos is looking for an IT Security Analyst to provide Functional Mission Analysis-Cyber assistance to identify the United States Air Force weapon system’s critical information technology architecture and supporting infrastructure that aids the warfighting mission. The Telos team supporting Functional Mission Analysis work activities shall possess a fundamental understanding of DoD Mission Assurance concepts and principles and how they relate to the United States Air Force (USAF) Mission. Team members shall be familiar with the purpose and use of the Mission Assurance Decision Support System (MADSS) and other similar data base repositories, such as the Strategic Mission Assurance Database System (SMADS). Together you and your teammates shall possess an in-depth knowledge of various technical resources pertinent to emerging cyber tools and capabilities required to perform functional mission analysis and supporting assessments, including open-source technologies.Job Responsibilities• Investigate a diverse collection of network activities in cyberspace to determine essential MRT-C support designed for command, control, processes, and systems.• Develop a strategy to identify, evaluate, and minimize risks in the local cyberspace environment that are considered crucial for mission success.• Create and implement strategies and techniques to merge and display relevant MRT-C, based on essential systems and network services.• Identify and analyze trends to define MRT-C requirements and provide guidance and alignment services.• Assist with FMA-C, identifying, mapping, and developing a defense plan to safeguard MRT-C.• Maintain databases to monitor systems, modify user boundaries, and create indexing to make searches easier.• Utilize classified and unclassified networks and information portals to create support and information distribution plans for mission activities.• Review and provide recommendations for establishing new or revised policies, procedures, objectives, and organization design for the staff, as necessary.• Coordinate with local SMEs to resolve events and/or incidents.• Brief supporting recommendations and Courses of Actions.• Define and perform vulnerability assessments leveraging threat analysis to scope and prioritize efforts.• Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings).• Coordinate with enterprise-wide cyber defense staff to validate network alerts.• Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment.• Perform cyber defense trend analysis and reporting.• Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack.• Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.Job Requirements:• Bachelor's degree in Computer Science, Information System Engineering, Business, or related technical discipline in cybersecurity or information technology.• Possess 5 years of combined experience in the following:• Functional Mission Analysis in Cyberspace processes and associated mapping and defense of Mission-Relevant Terrain in Cyberspace.• Information Technology (IT) cybersecurity principles, concepts, and methods to investigate, analyze, and respond to cyber incidents within a computer network environment or enclave• IT security principles, policies, products and services to assess risk factors and advise on vulnerability to attack from a variety of sources (e.g., destructive programs/applications/ viruses, unauthorized access, disruption of services, espionage) and procedures and methods for protection of systems and applications.• Commonly applied telecommunications principles, concepts, and methodologies, operating characteristics and capabilities of systems, media, equipment, and related software systems, processes, and procedures to assess the efficiency of operations and make recommendations involving equipment and system integrity.• IAT Level II Certification (ex: CompTIA Security+) in accordance with (IAW) DOD 8140 and AFMAN 17-1303.• Possess and maintain a Top-Secret clearance with SCI eligibility for access to classified processing systems.• Ability to communicate effectively, both orally and in writing.The successful candidate must meet eligibility requirements to access sensitive information, which requires US citizenship.Telos maintains a drug-free workplace and will conduct drug testing on all applicants who have accepted an offer of employmentTelos Corporation participates in the E-Verify program. Therefore, any employment with Telos will also be contingent upon confirmation from the Social Security Administration (“SSA”) and/or the Department of Homeland Security (“DHS”) of your authorization to work in the United States. Telos offers excellent compensation packages including salary commensurate with experience and benefits to meet your needs for today and the future.Telos Corporation and its subsidiaries are committed to equal opportunity for all, without regard to race, religion, color, national origin, citizenship, sex, sexual orientation, gender identity, age, veteran status, disability, genetic information, or any other protected characteristic. Telos Corporation will make reasonable accommodations for known physical or mental limitations of otherwise qualified employees and applicants with disabilities unless the accommodation would impose an undue hardship on the operation of our business. If you are interested in applying for an employment opportunity and feel you need a reasonable accommodation pursuant to the ADA, please contact us at 1-800-283-1911. If you require relay service assistance, please click on the following link to review information on your state’s relay service: https://www.fcc.gov/accessibilityTelos Corporation is an EEO/AA employer.EEOC Job Category
Telos Corporation Glassdoor Company Review
3.6 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Telos Corporation DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Telos Corporation
Telos Corporation CEO photo
John B. Wood
Approve of CEO

Average salary estimate

$100000 / YEARLY (est.)
min
max
$80000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Information Security Analyst (Cyber Security) - TS/SCI clearance required, Telos Corporation

Join Telos Corporation as an Information Security Analyst (Cyber Security) and become a part of a team that thrives on ensuring the safety of crucial IT assets for some of the most security-aware organizations. At Telos, we pride ourselves on our exceptional solutions and the integrity of our people, and we are excited to see how you can contribute to our mission in cyber, cloud, and enterprise security. This contingent role is dependent on contract award, so bring your A-game and be prepared to dive into exciting challenges! In this position, your key responsibilities will include investigating diverse network activities to support mission readiness and evaluating potential risks to aid in the United States Air Force's mission. You will work collaboratively with teammates to create strategies leveraging emerging cyber tools, all while staying well-informed on the Mission Assurance Decision Support System (MADSS) and other critical data repositories. Telos offers a competitive compensation package that includes generous paid time off, medical, dental, vision coverage, tuition reimbursement, and a 401k plan. Experience an engaging work environment where your contributions matter, and the company's commitment to your professional growth is evident. If you are ready to make a significant impact in cybersecurity, Telos Corporation is the place to be!

Frequently Asked Questions (FAQs) for Information Security Analyst (Cyber Security) - TS/SCI clearance required Role at Telos Corporation
What responsibilities does an Information Security Analyst have at Telos Corporation?

As an Information Security Analyst at Telos Corporation, you will be responsible for investigating network activities in cyberspace, developing strategies to mitigate risks, and creating comprehensive defense plans for mission-relevant terrain. Your role will also require the analysis of trends related to mission assurance and the collaboration with subject matter experts to resolve any cybersecurity incidents.

Join Rise to see the full answer
What qualifications are required for the Information Security Analyst position at Telos Corporation?

To qualify for the Information Security Analyst position at Telos Corporation, candidates must possess a Bachelor's degree in Computer Science or a related field, along with five years of experience in functional mission analysis in cyberspace. Additionally, an IAT Level II Certification is required, alongside a Top-Secret clearance with SCI eligibility.

Join Rise to see the full answer
How does Telos Corporation support its Information Security Analysts in their career growth?

Telos Corporation supports its Information Security Analysts through an excellent compensation package coupled with ongoing training opportunities and professional development resources. The company values employee growth and creates a dynamic environment where continuous learning and career advancement are encouraged.

Join Rise to see the full answer
What tools and technologies will an Information Security Analyst use at Telos Corporation?

Information Security Analysts at Telos Corporation will work with various tools and technologies including the Mission Assurance Decision Support System (MADSS) and other relevant cybersecurity resources. Analysts will also utilize classified and unclassified information systems to compile data and create information distribution plans.

Join Rise to see the full answer
What is the work environment like for Information Security Analysts at Telos Corporation?

The work environment at Telos Corporation is collaborative and innovative, designed to foster teamwork and structured problem-solving. With a focus on mission readiness, analysts engage in meaningful work that has a direct impact on national security while enjoying a positive company culture that prioritizes employee well-being.

Join Rise to see the full answer
Common Interview Questions for Information Security Analyst (Cyber Security) - TS/SCI clearance required
Can you describe your experience with functional mission analysis in cyberspace?

When answering this question, highlight your specific experiences in performing functional mission analysis, including any key projects you have worked on. Be sure to mention the techniques and methodologies you've used, and how they contributed to the mission's success.

Join Rise to see the full answer
What strategies do you implement to minimize risks in a cybersecurity landscape?

You should share specific strategies you've previously implemented, such as risk assessments, security audits, or the use of specific technologies to protect networks. Discuss your analytical approach and how you prioritize various risk factors.

Join Rise to see the full answer
How do you stay updated on the latest cyber security threats and tools?

Explain your continuous learning process, whether through attending conferences, participating in online courses, or engaging with professional organizations. Demonstrating your commitment to staying informed is crucial in the field of cybersecurity.

Join Rise to see the full answer
Describe a time when you had to coordinate with other teams to resolve a security incident.

Share a detailed account of an incident you managed, the communication strategies you used, and the outcomes of this collaboration. Focus on your role in facilitating resolution and how you ensured a comprehensive response.

Join Rise to see the full answer
What do you understand about the Mission Assurance Decision Support System (MADSS)?

Provide an overview of MADSS, emphasizing its purpose in mission assurance and how it impacts decision-making in cybersecurity. If you have any experience with it, be sure to mention that as well.

Join Rise to see the full answer
How do you approach vulnerability assessments in cyber environments?

Discuss your methodology for performing vulnerability assessments. Highlight the tools you use for scanning, reporting findings, and how you prioritize vulnerabilities to mitigate risks effectively.

Join Rise to see the full answer
What steps would you take to document an incident for escalation?

Outline the key documentation steps you follow, including gathering data on the incident, analyzing the impact, and composing a detailed report to ensure information is clear for future reference.

Join Rise to see the full answer
How do you ensure effective communication of cybersecurity policies within an organization?

Talk about the communication techniques you've used, such as training sessions, workshops, or written materials. Showcase how you tailor your message for different audiences to ensure understanding and compliance.

Join Rise to see the full answer
Can you provide an example of how you have used trend analysis in your previous roles?

Illustrate your answer with a specific example where you identified trends through data analysis, how you used this information to inform strategies, and the results it yielded for the organization.

Join Rise to see the full answer
What is your experience with classified and unclassified networks?

Share your background with both types of networks, detailing any specific roles where you managed or interacted with classified systems. Highlight your understanding of the associated protocols and security measures.

Join Rise to see the full answer
Similar Jobs
Wyetech Hybrid Hanover, Maryland
Posted yesterday
Photo of the Rise User
Posted yesterday
Photo of the Rise User
SpaceX Hybrid Cape Canaveral, FL
Posted 12 days ago
Mission Driven
Social Impact Driven
Passion for Exploration
Reward & Recognition
Remo Health Remote No location specified
Posted 10 days ago
Photo of the Rise User
CLEAR - Corporate Remote New York, New York, United States (Hybrid)
Posted 3 days ago
Photo of the Rise User
Customer-Centric
Collaboration over Competition
Growth & Learning
Take Risks
Medical Insurance
Dental Insurance
Vision Insurance
Flex-Friendly
Equity
Learning & Development

Telos Corporation offers solutions that assure the security of enterprise information and deliver that information to users when and where they need it. Our solutions are employed by defense and civilian agencies of the federal government, the in...

22 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, on-site
DATE POSTED
December 22, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!