![]() ![]() Conducts analysis to isolate indicators of compromise. Finds trends, patterns, or anomaly correlations utilizing security-relevant data. ![]() Identifies, triages, and reports events that occur in order to protect data, information systems, and infrastructure. ![]() Uses information collected from a variety of sources to monitor network activity and analyze it for evidence of anomalous behavior. LABOR CATEGORY: Cyber Defense Analyst, Level 3 Job description SECURITY CLEARANCE: TS/SCI w/ Polygraphs required ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |