CrawlJobs Logo

Computer Network Defense Analyst Level 2

elevi.net Logo

ELEVI Associates

Location Icon

Location:
United States , Annapolis Junction

Category Icon

Job Type Icon

Contract Type:
Not provided

Salary Icon

Salary:

94400.00 - 150000.00 USD / Year

Job Description:

As a Computer Network Defense Analyst (CNDA), you will use information collected from a variety sources to identify potential vulnerabilities, respond to cyber events, and defend against events that might occur. You will help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure. Your work may span traditional wired networks, wireless transport, collaborative platforms, and the supporting hardware and software. You can advance your career as you develop increasing expertise in networking protocols, cloud security, IoT protocols, and advanced network security.

Job Responsibility:

  • Use information collected from a variety sources (e.g., intrusion detection systems, firewalls, network traffic logs, and host system logs) to identify potential vulnerabilities, respond to cyber events that occur, and defend against events that might occur
  • Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems
  • Work may span the gamut of data transport possibilities, such as traditional wired networks, wireless transport (including Wi-Fi and cellular), collaborative platforms such as video teleconferencing, and the hardware and software that support it all
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers

Requirements:

  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Experience in network or system administration
  • Fully cleared with CI Poly
  • 5 years’ applicable experience with a bachelor’s degree, OR 7 years’ applicable experience with associate degree
What we offer:
  • Healthcare
  • Wellness
  • Financial
  • Retirement
  • Family support
  • Continuing education
  • Time off benefits

Additional Information:

Job Posted:
January 05, 2026

Job Link Share:

Looking for more opportunities? Search for other job offers that match your skills and interests.

Briefcase Icon

Similar Jobs for Computer Network Defense Analyst Level 2

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Fort Gordon
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees (Level 1: 2 years applicable experience with a bachelor's degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a master's degree, OR 5 years applicable experience with a bachelor's degree, OR 7 years applicable experience with an associate degree
  • Level 3: 4 years applicable experience with a PhD, OR 6 years applicable experience with a master's degree, OR 8 years applicable experience with a bachelor's degree, OR 10 years applicable experience with an associate degree
  • Level 4: 7 years applicable experience with a PhD, OR 9 years applicable experience with a master's degree, OR 11 years applicable experience with a bachelor's degree, OR 13 years applicable experience with an associate degree)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associate's degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Active TS/SCI with polygraph
  • Specific labor category determined by years of experience + educational degrees: Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Exploitation Analyst

As cyber threats evolve and proliferate at a rapid pace, Altamira Technologies i...
Location
Location
United States , Annapolis Junction
Salary
Salary:
Not provided
altamiracorp.com Logo
Altamira Technologies
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI with polygraph
  • Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security)
  • Relevant experience in computer or information systems design/development/analysis
  • Experience may include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an associates degree
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) will be considered towards the relevant experience/education requirement
  • In some cases, foreign language proficiency may also be used to satisfy experience requirements
  • recent Interagency Language Roundtable (ILR) scores are required to substantiate your proficiency level
  • Level 1: 2 years applicable experience with a bachelors degree, OR 4 years applicable experience with associate degree
  • Level 2: 2 years applicable experience with a PhD, OR 3 years applicable experience with a masters degree, OR 5 years applicable experience with a bachelors degree, OR 7 years applicable experience with an associate degree
Job Responsibility
Job Responsibility
  • Apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed
  • Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission relevance, and areas of expertise
  • Apply innate curiosity and analytical talent to form hypotheses, critically assess and choose analysis techniques, then query, merge, enrich, evaluate, and pivot within data to attain and share insights
  • Distill, document, contextualize and share findings--including any new tradecraft that you develop--with teammates, stakeholders, and intelligence consumers
Read More
Arrow Right

Computer Network Defense Analyst Mid Level

ITC is a Woman Owned Small Business delivering exceptional consultation to the U...
Location
Location
United States , Ft. Meade
Salary
Salary:
100000.00 - 200000.00 USD / Year
seekintegrity.com Logo
Integrity Technology Consultants
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • TS/SCI with CI or FS Poly Required
  • 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an Associate's degree
  • With an Associate's Degree, at least 7 years demonstrated experience related to job description
  • With a Bachelor's Degree, at least 5 years demonstrated experience related to job description
  • With a Master's Degree, at least 3 years demonstrated experience related to job description
  • With a Doctorate Degree, at least 2 years demonstrated experience related to job description
  • Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering
  • Must have experience in network or system administration
  • Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards relevant experience requirement
Job Responsibility
Job Responsibility
  • Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or might occur within their environment
What we offer
What we offer
  • 401K plan with company contributions (safe harbor and profit sharing)
  • 11 Federal holidays, 21 Days PTO
  • Medical, Dental, & Vision with substantial company contributions
  • Company provided Life, LTD and STD Insurance
  • Health Savings Accounts/ Flexible Spending Accounts
  • Referral Bonuses
  • Performance Bonuses
  • Tuition Assistance for Education, Training, and Professional certifications
  • Career Development
Read More
Arrow Right
New

Cyber Information Assurance Analyst SME

The Cyber Information Assurance Analyst SME provides IT support services for the...
Location
Location
United States , Albany, GA
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Secret Clearance is required and must be maintained for employment
  • Must be eligible for an IT-II upon assignment
  • Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification
  • IAM III and IAT II level certification is required
  • Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
  • Seven (7) years IT experience
  • Five (5) years IA experience
  • Two (2) years of experience with DOD Vulnerability Management System
  • Command Cyber Readiness Inspection certification in at least one of the following areas: Retina scan analysis
  • Operating Systems (Windows, Unix)
Job Responsibility
Job Responsibility
  • Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements
  • Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations
  • Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks
  • Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies
  • Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers
  • Recommends solutions to meet security requirements
  • Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture
  • Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves
  • Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC
  • Competent to work at the highest level of all phases of information systems auditing
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Cyber Information Assurance Analyst SME

The Cyber Information Assurance Analyst SME provides IT support services for the...
Location
Location
United States , Albany
Salary
Salary:
Not provided
chickasaw.com Logo
Chickasaw Nation Industries, Inc (CNI)
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Secret Clearance is required and must be maintained for employment
  • Must be eligible for an IT-II upon assignment
  • Tenable Certified NESSUS Auditor required and must maintain CSSP Auditor Certification
  • IAM III and IAT II level certification is required
  • Proven proficiency performing CCRI / vulnerability assessment / penetration testing on networks, databases, computer applications and IT frameworks
  • Seven (7) years IT experience
  • Five (5) years IA experience
  • Two (2) years of experience with DOD Vulnerability Management System
  • Command Cyber Readiness Inspection certification in at least one of the following areas: Retina scan analysis
  • Operating Systems (Windows, Unix)
Job Responsibility
Job Responsibility
  • Independently performs complex security analysis of classified and unclassified applications, systems and enclaves for compliance with security requirements
  • Performs Command Cyber Readiness Inspections and cybersecurity vulnerability evaluations
  • Uses a variety of security techniques, technologies, and tools to evaluate security posture in highly complex computer systems and networks
  • Performs vulnerability and risk analysis, and participate in a variety of computer security penetration studies
  • Analyzes and defines security requirements for computer and networking systems, to include mainframes, workstations, and personal computers
  • Recommends solutions to meet security requirements
  • Gathers and organizes technical information about an organization's mission goals and needs, and makes recommendations to improve existing security posture
  • Provide enterprise-wide technical analysis and direction for problem definition, analysis and remediation for complex systems and enclaves
  • Provides workable recommendations and advice to client executive management on system improvements, optimization and maintenance in the following areas: Information Systems Architecture, Automation, Telecommunications, Networking, Communication Protocols, Application Software, Electronic Email, VOIP and VTC
  • Competent to work at the highest level of all phases of information systems auditing
What we offer
What we offer
  • Medical
  • Dental
  • Vision
  • 401(k)
  • Family Planning/Fertility Assistance
  • STD/LTD/Basic Life/AD&D
  • Legal-Aid Program
  • Employee Assistance Program (EAP)
  • Paid Time Off (PTO) – (11) Federal Holidays
  • Training and Development Opportunities
  • Fulltime
Read More
Arrow Right

Cyber Security Operations Analyst

Responsible for progressing cybersecurity operations, maintaining proactive thre...
Location
Location
United States , Bethesda
Salary
Salary:
Not provided
anavationllc.com Logo
AnaVation
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Active TS/SCI Clearance with CI Polygraph
  • 6-10 years of Cyber Security/Operations support OR Bachelor’s degree in Network Engineering, Computer Science or related technical field and 2-4 years of experience
  • DoD 8140 IAT Level II Certification (CCNA-Security, CySA+, CND, Security+)
  • Documenting network schemas and cyber operation tool solutions
  • Provide security posture, vulnerability, threat and risk situational awareness to support staff, leadership, workforce, stakeholder organizations and community
  • Halt or minimize cyber-attack and insider threat efforts or damage
  • Designing, modeling, and securing networks
  • Troubleshooting network issues and recommendation of network modifications to optimize performance while adhering to all relevant security policies
  • Knowledgeable on the use of different SIEM applications, its interfaces, and how to retrieve data from its database
  • Knowledgeable on log aggregation and event correlation of any SIEM
Job Responsibility
Job Responsibility
  • Progressing cybersecurity operations
  • Maintaining proactive threat detection capabilities
  • Conducting vulnerability scanning and risk assessment using security tools such as Assured Compliance Assessment Solution (ACAS), Host Based Security System (HBSS), and Security Information Event Management (SIEM)
  • Performing real-time monitoring and defense of the IT environment to ensure resilience against cyber threats and vulnerabilities
  • Responding to alerts from HBSS and SIEM systems by conducting analysis and taking appropriate responses
  • Managing IPS/IDS systems to detect and prevent unauthorized access and protect network and data integrity
What we offer
What we offer
  • Generous cost sharing for medical insurance for the employee and dependents
  • 100% company paid dental insurance for employees and dependents
  • 100% company paid long-term and short term disability insurance
  • 100% company paid vision insurance for employees and dependents
  • 401k plan with generous match and 100% immediate vesting
  • Competitive Pay
  • Generous paid leave and holiday package
  • Tuition and training reimbursement
  • Life and AD&D Insurance
  • Fulltime
Read More
Arrow Right

Cybersecurity Expert (SOC & Cloud)

The Security team is excited to welcome a motivated Cybersecurity Expert to help...
Location
Location
Spain , Barcelona
Salary
Salary:
Not provided
leadtech.com Logo
Leadtech Group
Expiration Date
Until further notice
Flip Icon
Requirements
Requirements
  • Bachelor/ Master's degree in Cybersecurity, Information Security, Computer Science, or a similar discipline
  • Knowledge of Security frameworks such as ISO 27001, NIST, PCI-DSS, OWASP, GDPR
  • Knowledge of technical concepts such as cloud computing, code review, application security, cryptography, forensics, vulnerability detection (Azure & AWS are a must)
  • Deep Knowledge of cybersecurity/technical concepts such as: GNU/Linux systems
  • Microsoft Sentinel and Defender, as well as experience with writing KQL queries
  • Microsoft Azure (Network Security Groups, Recovery Services Vaults, Playbooks and Workbooks)
  • TCP/IP, DNS, and firewalls
  • Python, Bash, and SQL, Java, PHP
  • Familiarity with attack and exploitation techniques involving operating systems, applications, and devices (CISSP, CompTIA, CEH)
  • Understanding of security best practices for data and systems protection
Job Responsibility
Job Responsibility
  • Operate & optimize (and potentially Lead) a Security Operations Center (SOC)
  • Advanced Incident Investigation and Analysis
  • Handling Complex Threats: Investigating high-priority alerts escalated from Tier 1/2, such as potential APTs (Advanced Persistent Threats) or ransomware
  • Deep-Dive Analysis: Performing forensics on compromised systems, analyzing malware, and reconstructing attack chains using packet captures and log data
  • Cross-Source Correlation: Stitching together fragmented data from SIEM, EDR (Endpoint Detection and Response), and NDR (Network Detection and Response) tools to build a comprehensive picture of the attack
  • Proactive Threat Hunting and Detection Engineering
  • Threat Hunting: Proactively searching network and endpoint data for undetected, hidden threats rather than waiting for alerts
  • Rule Creation & Tuning: Developing custom detection logic and SIEM correlation rules to identify new malicious behavior
  • Reducing False Positives: Refining alert systems to minimize noise, ensuring the team focuses on genuine security incidents
  • Incident Response and Containment
What we offer
What we offer
  • Flexible career path with personalized internal training and an annual budget for external learning opportunities
  • Flexible schedule with flextime (7 - 9:30 a.m. start, 3:30 - 6 p.m. end)
  • Free Friday afternoons with a 7-hour workday
  • 35-hour workweek in July and August
  • Competitive salary
  • Full-time permanent contract
  • Top-tier private health insurance (including dental and psychological services)
  • 25 days of vacation plus your birthday off, with flexible vacation options—no blackout days
  • Office in Barcelona complete with free coffee, fresh fruit, snacks, a game room, and a rooftop terrace with stunning Mediterranean views
  • Ticket restaurant and nursery vouchers, paid directly from your gross salary
  • Fulltime
Read More
Arrow Right