Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Cybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and ResilienceCybersecurity & Infrastructure Security Agency logo America’s Cyber Security Defense Agency National Coordinator For Critical Infrastructure Security and Resilience
CISA Logo

Search

 

America's Cyber Defense Agency
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium BusinessesFind Help LocallyFaith-Based CommunityExecutivesHigh-Risk Communities
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
    CISA Conferences
    CISA Live!
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
  • About
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Site Links
    CISA GitHub
    CISA Central
    Contact Us
    Subscribe
    Transparency and Accountability
    Policies & Plans

Free Cyber ServicesSecure by design Secure Our WorldShields UpReport A Cyber Issue

Breadcrumb
  1. Home
  2. Careers At CISA
  3. Cyber Defense Analyst
Share:

Careers

  • Benefits & Perks
  • HireVue Applicant Reasonable Accommodations Process
  • Hiring
  • Resume & Application Tips
  • Students & Recent Graduates
  • Veteran and Military Spouses

Cyber Defense Analyst

CISA Cyber Defense Analyst

This role uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.

Personnel performing this work role may unofficially or alternatively be called:

  • Computer Network Defense (CND) Analyst
  • Cybersecurity Analyst
  • Incident Analyst
  • Network Defense Technician
  • Network Security Engineer
  • Security Analyst
  • Security Operator
  • Sensor Analyst
  • Senior Network Security Engineer
  • Focused Operations Security Analyst

Skill Community: Cybersecurity
Category: Protect and Defend
Specialty Area: Cyber Defense Analysis
Work Role Code: 511

Core Tasks

  • Provide timely detection, identification, and alerting of possible attacks/intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from benign activities. (T0258)
  • Use cyber defense tools for continual monitoring and analysis of system to identify malicious activity. (T0259)
  • Document and escalate incidents (including event's history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment. (T0155)
  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information. (T0260)
  • Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack. (T0166)
  • Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings). (T0294)
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. (T0214)
  • Perform cyber defense trend analysis and reporting. (T0164)
  • Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources. (T0023)
  • Coordinate with enterprise-wide cyber defense staff to validate network alerts. (T0043)
  • Identify and analyze anomalies in network traffic using metadata. (T0293)
  • Provide daily summary reports of network events and activity relevant to cyber defense practices. (T0198)
  • Identify applications and operating systems of a network device based on network traffic. (T0297)

Core Competencies

  • Computer Network Defense
  • Data Management
  • Information Systems/Network Security
  • Infrastructure Design
  • Network Management
  • Technology Awareness
  • Threat Analysis
  • Vulnerability Assessment

Core Knowledge

  • Knowledge of cybersecurity and privacy principles. (K0004)
  • Knowledge of computer networking concepts and protocols, and network security methodologies. (K0001)
  • Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. (K0003)
  • Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). (K0002)
  • Knowledge of cyber threats and vulnerabilities. (K0005)
  • Knowledge of specific operational impacts of cybersecurity lapses. (K0006)
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. (K0046)
  • Knowledge of cyber defense and information security policies, procedures, and regulations. (K0157)
  • Knowledge of the common attack vectors on the network layer. (K0160)
  • Knowledge of Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications. (K0324)
  • Skill in collecting data from a variety of cyber defense resources. (S0063)
  • Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). (K0049)
  • Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). (K0061)
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. (K0332)
  • Knowledge of network traffic analysis methods. (K0058)
  • Knowledge of new and emerging information technology (IT) and cybersecurity technologies. (K0059)
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). (K0161)
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored). (K162)
  • Knowledge of cyber defense and vulnerability assessment tools and their capabilities. (K0013)
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. (K0106)
  • Knowledge of how to use network analysis tools to identify vulnerabilities. (K0339)
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks. (S0078)
  • Skill in performing packet-level analysis. (S0156)

How To Apply

Join the Mission! CISA is always searching for talented and highly motivated professionals to continue our mission of securing the nation's critical infrastructure. CISA is more than a great place to work; our workforce tackles the risks and threats that matter most to the nation, our families and communities.

Please visit USAJOBS and/or the DHS Cybersecurity Service to view job announcements and apply to positions. Be sure to tailor your resume to the specific job announcement, attach relevant documents and complete all required assessments.

When applying for a cyber role, please review the information above and update your resume to align your experience with the listed competencies. Your resume must also show demonstrated IT-related experience in:

  • Attention to Detail
  • Customer Service
  • Oral Communication
  • Problem Solving

To receive email notifications when new CISA positions are announced, set up a "saved search" on USAJOBS with keyword "Cybersecurity and Infrastructure Security Agency."

Individuals eligible for special hiring authorities may also be considered during CISA's one-stop hiring events or by emailing Veterans@cisa.dhs.gov or Careers@cisa.dhs.gov.

Apply Now 

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • X
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 1-844-Say-CISA SayCISA@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • Subscribe
  • The White House
  • USA.gov
  • Website Feedback