Junior Security Analyst - SECRET Clearance Required
Listed on 2026-03-01
-
IT/Tech
Cybersecurity, Network Security, Security Manager
Direct Viz Solutions (DVS) is a dynamic and rapidly growing government contractor committed to delivering innovative IT solutions that address the mission‑critical needs of our government clients. Through the expertise and dedication of our talented team, we provide cutting‑edge technology services designed to achieve success and exceed expectations.
At DVS, we prioritize our employees as our greatest asset. We offer competitive compensation, comprehensive medical benefits, a 401(k) match, generous PTO accrual, professional development reimbursement, corporate‑funded technology certifications, and robust employee recognition and appreciation programs.
Title:
Junior Security Analyst
Location:
Herndon, VA
Clearance:
Active Secret or higher. REQUIRED
This position is from Sunday - Tuesday from 6:00 PM - 6AM or Thursday - Saturday from 6:00 PM - 6 AM and will rotate Wednesdays. Must be willing to work this shift.
DVS is looking for a Junior Security Analyst to join our growing team. The work location is onsite in Herndon, VA. Must have an active Secret clearance.
Key Responsibilities- Monitor and analyze security events and alerts reported by the TSA Security Information and Event Management (SIEM) system on a 24x7x365 basis.
- Identify and investigate suspicious or malicious activity and cyber events that violate TSA policy.
- Analyze logs and events from current and future device types that send data to the TSA Security Operations Center (SOC).
- Review non-traditional data feeds (e.g., Human Resources data, badging information, physical security devices) integrated into the SIEM architecture.
- Document all findings and additional information collected during each security investigation.
- Record all relevant artifacts (e.g., emails, logs, documents, URLs, screenshots) associated with security events and incidents in the TSA SOC incident tracking system.
To support the 24x7x365 requirements of cyber operations there are four (2) available shift schedules:
- Shift 1 - Sun, Mon, Tue - 6 PM to 6 AM
- Shift 2 - Thu, Fri, Sat - 6 PM to 6 AM
The shifts will rotate personnel every other Wed to work 8 hours which will equal 80 hours over 2 weeks.
Required QualificationsEducation:
High School degree.
- 1 to 3 years of experience working in a Security Operations Center (SOC) or Network Operations Center (NOC) environment performing security event monitoring and analysis
- Working knowledge of the various operating systems (e.g. Windows, OS X, Linux, etc.) commonly deployed in enterprise networks.
- Must possess a working knowledge of network communications and routing protocols (e.g. TCP, UDP, ICMP, BGP, MPLS, etc.) and common internet applications and standards (e.g. SMTP, DNS, DHCP, SQL, HTTP, HTTPS, etc.)
- Must be capable of analyzing security logs and events from the following types of devices such as, but not limited to:
Firewalls (FWs), Intrusion Detection Sensors/Intrusion Prevention Sensors (IDS/IPS), Host‑based Intrusion Detection System/ Host‑based Intrusion Prevention System (HIDS/HIPS), proxy/web filter, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco Net Flow), Virtual Private Network (VPN) gateways/concentrators, server event logs, e‑mail and host anti‑virus, desktop security monitoring agents, anti‑virus servers, IP services (i.e. Domain Name System (DNS) Services, Dynamic Host Configuration Protocol (DHCP), network address translation devices, MDM (e.g. cellphones), Public Key Infrastructure (PKI), and cloud security infrastructure (e.g. Amazon Web Services (AWS), Azure, Oracle, Salesforce, etc.) - Clearance Requirements:
Secret or higher.
- Certification:
Security+, GIAC Security Essentials (GSEC) or equivalent certification is desired - Experience with Splunk query language
- Experience with IDS/IPS/firewall/security configurations and signature development
- Experience with PCAP analysis
- Experience with Tanium threat response
- Ability and prior experience with analyzing information technology security events to discern events that qualify as legitimate security incidents as opposed to non-incidents. This includes the identification of malicious code present within a…
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).