Cybersecurity CND-SP Auditor
Candidates must have an active DoD TS/SCI clearance, with the ability to pass a polygraph exam.
IC-CAP is an IT/Analytics services company located in Washington, DC. We are focused on improving the practice of intelligence analysis through the preparation of data, enhanced visualizations, and the development of an enhanced analytical workforce. Our members are our greatest assets, and we offer greater career potential and work-life balance through our approach to career growth, training, mentorship, and our variable benefits package.
​
Are you an experienced Cybersecurity CND-SP Auditor passionate about the security and defense of the United States? Interested in working for a company driven to improve our country’s intelligence and defense capabilities through technology? We're seeking candidates with experience using cyber tools such as Splunk, ArcSight, Fidelis, or FireEye.
​
Responsibilities:
-
Comprehensive monitoring of cyber tools, reviewing system and application logs, intrusion detection alerts for indication unauthorized activity, insider threat, or criminal behavior punishable by law, code or statue.
-
Discover, identify, mitigate and report intentional or unintentional unauthorized use of customer information and information systems.
-
Monitor for fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity and provide support to Threat Mitigation Cell, Law Enforcement, General Counsel, Inspector General, customer privacy Office, and the customer Operations Security (OPSEC) Office through investigative research, forensic examination, internet monitoring and formal reporting.
-
Identity Leakage (PII) Related, DoD Directive 54000.1, Privacy Program, which constitutes detection of SSN#s, Credit card information, and other personally identifiable information.
-
Determine if the information constitutes a violation of Personally Identifiable information especially when the information is sent outside Government network, Information does not belong to the person sending it, information is not encrypted or password protected.
-
Produces case evidence and reports.
-
Work on special projects as assigned.
-
Prepares incident reports of analysis methodology and results.
-
Maintains current knowledge of relevant technology as assigned
If this sounds like you or you know someone who would be a solid fit, let's talk! Send us your resume and a bit about yourself!