We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results
New

Information Security Analyst (Junior)

Castalia Systems
paid holidays, 401(k)
United States, Virginia, Springfield
Sep 11, 2025

Job Type: Full- Time

Workplace Type: Onsite in Springfield, VA

Clearance: Active Secret Clearance

Must be a U.S. Citizen

Benefits: Medical, dental, and vision coverage, 401k matching, generous PTO, paid holidays, professional training opportunities, and even pet insurance to ensure your furry friends are cared for too.

Job Summary

Castalia Systems is currently searching for an Information Security Analyst (Junior) for the US Battlefield Information Collection and Exploitation System eXtended (US BICES-X) program in Virginia. US Battlefield Information Collection and Exploitation Systems eXtended (US BICES-X) is a cutting-edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and their missions. We are seeking a creative and driven professional with a passion for solving real world issues on a cross-functional, fast paced team.

Roles and Responsibilities

A qualified candidate will perform the following duties and responsibilities, but are not limited to:



  • Review cyber intelligence and identify how current threats affect US BICES networks.
  • Perform cyber detection and incident response activities for a large program; coordinates with government program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
  • Review cyber events and document cybersecurity incidents utilizing ServiceNow.
  • Produce after action reports following closure of cybersecurity incidents.
  • This position will work within cybersecurity environment monitoring, analyzing, and responding to cybersecurity events and incidents not limited to; Analysis of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
  • Work with vendors to ensure the DCO tool suites detect and capture required cyber incidents, to include the latest industry threats and zero-days, etc.
  • Review intelligence reports and provide a daily cyber assessment on the impact to US BICES networks.
  • Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations
  • Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity.
  • Research and develop methods of tracking and detecting malicious activity within a network
  • Be available for after-hours support when required. Incident response is a vital position to respond to critical cyber-attacks, and our Enterprise is a 24/7 operation.
  • Participate in daily use of threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer's networks.
  • Perform malware analysis with DCO tools.
  • Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort)
  • Create, modify, and tune Splunk dashboards, reports, and alerts related to real-time detection and incident response.
  • Utilize available resources to conduct Cybersecurity activities and report to senior and government personnel on overall program security posture.
  • Communicate tactical and strategic threat information to Government leadership, Cybersecurity Operations Team and the Assessment & Authorization Team to assist them in making cyber risk decisions and to mitigate threats.
  • Coordinate with USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, CVAs, ST&Es, and CCRI
  • Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems
  • Assists with implementation of countermeasures or mitigating controls.
  • Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
  • Work with the Information Assurance Team, Security Managers and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
  • Provides guidance and work leadership to less experienced technical staff members.
  • Maintains current knowledge of relevant technology as assigned.
  • Participates in special projects as required.
  • Provide incident detection through understanding malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.



Required Qualifications:



  • 5+ years of relevant experience required.
  • BA/BS degree
  • Required Certification: CEH, CFR, CHFI, CySA+
  • Experience with Computer Security Incident Response, Cyber Security
  • Direct experience in the implementation, administration, and configuration of Trellix ePO in a global enterprise environment
  • Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerability scanning
  • Experience with Splunk


Desired Qualifications:



  • Experience reviewing network, host, and firewall security logs



Physical Requirements/Work Environment



  • Normal office environment.


Travel

Less than 5%.

Company Description

Castalia Systems is a proven business partner providing mission critical solutions to the Federal Government. We provide cutting edge solutions from Securing and Managing Data to Systems Engineering and Development. Castalia Systems is a pioneer in Artificial Intelligence Design and Application.

With our vast knowledge of our customers' needs and relevant technology, our team is able to bring successful solutions to every mission. We are one-upping our competitors by providing premium IT solutions and platforms with cutting-edge technology so it's so evident when you compare us with anyone.

Disclaimer

Castalia Systems is an equal employment opportunity and affirmative action employer and strives to comply with all applicable laws prohibiting discrimination based on race, color, creed, sex, sexual orientation, age, national origin, or ancestry, physical or mental disability, veteran status, marital status, HIV-positive status, as well as any other category protected by federal, state, or local laws. All such discrimination is unlawful, and all persons involved in the operations of the company are prohibited from engaging in this type of conduct.

#CJ

Applied = 0

(web-759df7d4f5-j8zzc)