Cyber Job Description

Cyber Job Description

4.9
173 votes for Cyber
Cyber provides system administration services for Linux / UNIX infrastructure and development systems (scripting and loading machines using KickStart system configuration).

Cyber Duties & Responsibilities

To write an effective cyber job description, begin by listing detailed duties, responsibilities and expectations. We have included cyber job description templates that you can modify and use.

Sample responsibilities for this position include:

Develop Windows topic area training material to meet Government identified training standards
Assisting technical personnel in developingautomated analytic tools by providing specific information about adversarytargets and techniques
Finds and investigates anomalies
Ability to apply advanced cyber analytic policies across enterprise
Accountable for the quality of own work
Provide leadership to integrated product teams (IPTs) with responsibility for the design development of SE products
Perform cyber security data analyst activities with specific focus on large-scale data analytics
Through the use of network behavior trending and network stability, utilize statistical deviation level, obtained from tools processing the data, to establish identifiable network norms and deviations
Incorporate knowledge of Windows Operating Systems vulnerabilities into training materials
Incorporate the impact of changing Windows Operating Systems technologies into training materials

Cyber Qualifications

Qualifications for a job description may include education, certification, and experience.

Licensing or Certifications for Cyber

List any licenses or certifications required by the position: IAT, II, CISSP, CEH, RMF, ITIL, DIACAP, III, CASP, CCNA

Education for Cyber

Typically a job would require a certain level of education.

Employers hiring for the cyber job most commonly would prefer for their future employee to have a relevant degree such as Bachelor's and Master's Degree in Computer Science, Engineering, Education, Technical, Computer Engineering, Cyber Security, Information Systems, Science, Electrical Engineering, Mathematics

Skills for Cyber

Desired skills for cyber include:

Procedures
NIST
Techniques
Linux
Firewalls
ACAS
Standards
UNIX
Networking
SCAP

Desired experience for cyber includes:

Assist the government in maintaining the Cybersecurity baseline (method of defining the USSTRATCOM Cybersecurity “as is” configuration – current information assurances/security system configurations)
Identify Cybersecurity compliance issues for projects, planning documents, and new requirements and recommend directions to make each compliant with USSTRATCOM Cybersecurity guidance and requirements, or as specified by the government Security Office (GSO) or command Cybersecurity
Provide security and risk analysis of engineering solutions, to include technical solution development, testing, implementation, and integration
Assist the Cyberspace Assurance Division and GSO as required in conducting and documenting a security and risk analysis
Develop security authorization packages, as required
Participate in and support Cybersecurity review groups such as Cyber Security Working Groups and the Information Assurance Steering Group (IASG) as required by USSTRATCOM

Cyber Examples

1

Cyber Job Description

Job Description Example
Our innovative and growing company is searching for experienced candidates for the position of cyber. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for cyber
  • Assess student knowledge, skills, and abilities to gauge student proficiency in topic area
  • Apply industry best practices in adult learning principles and theories
  • Review and analyze training materials and recommend changes
  • Conduct courses relevant to the assigned topic area
  • Provide technical area expertise to advise on the development of training material to meet the Windows Operating Systems topic area objectives
  • Ensure Windows topic area training material Is integrated and supports related topic area training materials
  • Perform task and skill analysis of training requirements to develop learning objectives within training materials
  • Interact with training developers, curriculum managers and mission customers to assist with design and implementation of a total training package
  • Coordinate with ADET to incorporate training into the NCS curriculum as required
  • Strong team player and communicator who is able to lead, motivate, and participate in a team oriented, fast-paced environment
Qualifications for cyber
  • Must be able to maintain level of clearance required for this position
  • Working knowledge of DCID 6/3
  • Currently hold at least one (1) industry-standard information security management certification from a vendor or product neutral certification entity
  • Ability to identify C2, dropper files, registry key modifications, DLL injection, based on malware analysis
  • Pursing a Bachelor or Master of Science degree in Electrical or Computer Engineering, Computer Science, Physics, or a similar field, with a focus Cyber Security
  • Process analysis/engineering
2

Cyber Job Description

Job Description Example
Our innovative and growing company is hiring for a cyber. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for cyber
  • Problem definition, data exploration, data acquisition and visualization, evaluating and comparing metrics, deploying various models and iteratively improving solutions
  • Develop continuous improvements with Fusion Center teams to push the organization towards new and improved ways to use data to improve our protective posture
  • Engage with stakeholders to identify data efficiency requirements
  • Will be responsible for instruction of Cyber and security related training
  • Serves as a Cyberspace Operations Training Developer/Instructor to identify, develop, tailor, deploy, and provide Cyber and/or security related training and will plan, develop, and assist in the implementation of Cyber and/or security training programs for the client, including Train-The-Trainer (TTT) items
  • Prepare lesson plans and training materials, design product demonstrations, develop course content, and conduct training
  • Performing tasks associatedwith the production cycle, including researching, tasking, analysis, reporting,assessing, and interacting with customers
  • Contributing to knowledge management byentering sources and analytic findings into appropriate databases and otherrepositories on a timely basis
  • Meeting customers' delivery deadlines andsatisfying customer expectations for accuracy and completenes
  • Documenting reports and customer feedback inlocal Request for Information (RFI) tracking databases and other recordingsystems
Qualifications for cyber
  • Bachelor’s degree students must earn a minimum GPA of 3.0 on a 4.0-point scale
  • Must be able to work full time during summer months
  • BA or BS degree in Cyber, Law Enforcement, or an Intelligence
  • Have a minimum of seven (7) years of experience, with at least four (4) of those involving CND and Incident Response
  • Possess security certifications (CISSP, Security+, IAT certificatoin)
  • Five or more years of related experience in Advanced Cyber Analytics
3

Cyber Job Description

Job Description Example
Our innovative and growing company is looking for a cyber. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for cyber
  • Participate in training and helping our organization to keep up to date with market standards within the IT, ICS and security area
  • Provides in-depth research, analysis, and support to Observer Trainers (OTs) across all functional areas within the Deployable Training Division (DTD), including preparation for academics, exercises, and staff assist visits, analytic support during academics, exercises, and staff assist visits (SAVs), and preparing the functional after-action review, Commander’s Facilitated After-action Review (FAAR), and Commander’s Summary Report (CSR)
  • Maintains and reviews historical data and produces functional area overviews and trend analysis reports
  • Assists in development and updating functional area focus papers and input to Joint Doctrine
  • Provides functional area experience, continuity, and expertise in training and developing functional area OTs
  • Serves as military trainer in the functional area as a member of the DTD Deployable Training Team (DTT), providing facilitated academic seminars, collecting observations and best practices, and providing advice and assistance to training audiences during exercises and SAVs
  • Conducts in-depth research and analysis in preparation for exercises, provides functional after-action reviews, and provides support to the DTT Team Chief in preparing the FAAR and CSR
  • Provides facilitated seminars on joint operations for the KEYSTONE, CAPSTONE, and PINNACLE programs as part of the Senior Leader Education Program for the National Defense University
  • Provide computer security incident response including monitoring, detection, investigation, and lessons learned
  • Research and analyze security threat intelligence from a variety of sources
Qualifications for cyber
  • Experience working with version control systems (SVN, GIT, ) as part of a structured development environment
  • Data/statistical analysis
  • Full-time students enrolled in a four-year college or university working toward a BS in a related field
  • Vigilantly protect User data, ensuring proper handling and protection electronically
  • Experience with remote desktop technologies, VNC, RDP
  • 5+ years of experience with developing and revising DoD Joint planning doctrines and processes
4

Cyber Job Description

Job Description Example
Our company is growing rapidly and is searching for experienced candidates for the position of cyber. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for cyber
  • Conduct analyses of breaches, attacks and insider threats on customers’ cloud assets
  • Investigate cloud cyber incidents and work with customers towards their resolution
  • Apply data research tools, threat intelligence and external feeds to research cloud cyber security events
  • Analyze data and alerts to establish ongoing risk and threat metrics and threat indicators
  • Author advisories, incident reports, research papers and blog posts
  • Oversee the deployment of products by vendors
  • Carryout ISO27001 IT Audits on various projects
  • Implement ISO27001 directives
  • Perform vulnerability assessments on IT infrastructure and provide fixes
  • Orchestrate automatic deployment of end-point solutions from vendors like Symantec / Mac Afee / Trend Micro and Kaspersky
Qualifications for cyber
  • Working knowledge of full packet capture PCAP analysis and accompanying tools (Wireshark, netcat, hping)
  • 3+ years of recent operational security experience (SOC, Incident Response, Forensics, Malware Analysis, IDS/IPS Analysis)
  • Ability to demonstrate proficiency in the Farsi language with at least a 2/2 on the DLPT
  • IAT Level III certification (CASP, CISA, CISSP, GCIH (or Associate), GCED)
  • Penetration testing, Pen testing, pen tester, penetration tester
  • Malware analysis, IDAPro
5

Cyber Job Description

Job Description Example
Our growing company is looking to fill the role of cyber. To join our growing team, please review the list of responsibilities and qualifications.
Responsibilities for cyber
  • Act as on the spot problem solver in a ‘get the job done’ spirit
  • Ensure verification and documentation while the job is being performed
  • Gather and compile evidence documentation
  • Perform random test to verify job execution
  • Report on both progress by email
  • Report on other issues detected/suspected that could justify some extra work
  • Manage MS Exchange and Active directory
  • Manage CISCO appliances
  • Selects, underwrites, and prices commercial lines cyber risks accounts with some level of of complexity and within delegated underwriting authority
  • Maintains a highly technical expertise in cyber risk commercial lines underwriting
Qualifications for cyber
  • SANS Training (e.g., Forensics series 408, 508
  • Encase training & cert
  • Programming C++, C, Java, other languages and platforms
  • Bachelor's degree in Computer Science or a related field with 5 years of experience OR Masters degree and 3years of experience
  • Education in Computer Science, Mathematics, Data Mining, Analytics, Data Science or other quantitative disciplines
  • Knowledge of a range of computer security issues, with depth in at least one or two functional areas

Related Job Descriptions

Resume Builder

Create a Resume in Minutes with Professional Resume Templates