Sign In




Cyber Defense Analyst - Real TimeCyber Defense Analyst - Real TimeGP0|#036d7cad-49e3-4a98-8821-efa704301d6d L0|#0036d7cad-49e3-4a98-8821-efa704301d6d|Exelon Generation GTSet|#bb697efb-4d63-4298-b4d0-ab279caf3fe8GP0|#1a3822e1-c50a-4c56-8c13-3bf917b7f3b3 L0|#01a3822e1-c50a-4c56-8c13-3bf917b7f3b3|Exelon Generation Company LLC GTSet|#e70f62ad-35ba-4371-ba87-92cfd51534bf GPP|#1b639f21-edff-47d9-a4b6-513f021f4bbcFalseFalseGP0|#a60fe4ce-4c4f-4a00-b081-a88d0990bc61 L0|#0a60fe4ce-4c4f-4a00-b081-a88d0990bc61|Security GTSet|#7712b39a-721e-4406-b3c9-bfbaaf3b9a98204408,<p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Perform the security monitoring process and escalate relevant issues to the Cyber Defense Team Lead � Real Time.   Identify potential security incidents and forward to the appropriate  team for further analysis. Uses data collected from a variety of cyber defense tools (e. g. , IDS alerts, firewalls, network traffic logs. ) to analyze events that occur within their environments for the purposes of mitigating threats. </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"> </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Perform cyber security monitoring of Industrial Control/SCADA systems with established monitoring tools including Industrial Defender and Splunk<br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Perform tracking of cyber events as required for NERC CIP Compliance. <br>Interface with various business entities to determine nature of detected cyber events, perform detailed analysis on cyber events and advise entities on methods to improve security posture<br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Create detailed documentation on use of monitoring systems, topology and details of business entity ICS/SCADA systems, and performance of NERC CIP logging monitoring and alerting processes<br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Provide daily summary reports of network events and activity relevant to cyber defense practices. Use cyber defense tools for continual monitoring and analysis of system activity to identify malicious activity. <br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Remain up-to-date on the latest security information in order to validate the security analysis & identification capabilities of the security operations technologies<br></p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;">Participate in efforts to analyze & define security filters & rules for a variety of security parameters</p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"> </p><br><p style="MARGIN-BOTTOM:0px;MARGIN-TOP:0px;"><br> </p>