Listing Description
The Role
Our incident handlers are responsible for triaging security alerts detected by Enterprise Detection and SIEM, analyzing all available data to determine if a cyber-attack is occurring, scoping the extent of a suspected attack, coordinating efforts to contain attacks, performing forensic investigations to determine the details around an attack, and providing guidance on remediation actions.
In this role, you will lead attack scope and root cause analysis, develop attack remediation strategies and ensure the communication and handle escalations of security activities. You will also assist in the development of incident handling processes, standard operating procedures, playbooks and runbooks. Through developing workflow automation, you will lower response times.
You will work with Enterprise Detection and SIEM teams to make improvements to detection and alerting mechanisms and conduct forensic investigations to determine incident details and provide supporting evidence. You will also act as a technical liaison for third party incident responders and develop templates for third party communications for legal review.
Role Requirements
You should have extensive demonstrated experience in leading cyber-attack investigations and of working in a similar 24/7 environments managing cases with enterprise SIEM or Incident Management systems. Previous experience of leading multi-functional teams is also required.
We are looking for analytical, critical thinkers, who have an eye for detail and are solution orientated. You should be quick to learn and adapt and operate in a dynamic environment.Ability to possess and maintain a U.S. Government/DoD Clearance (US CITIZENSHIP IS A MUST)
Security certification (e.g. Security+, GCIA, GCIH, CISSP)
Comprehensive knowledge APT actors; their tools, techniques, and procedures (TTPs)
Expert knowledge of TTP methods and frameworks
Expert knowledge of TCP/IP communications & knowledge of how common protocols and applications work at the network level, including DNS, HTTP, and SMB
Expert knowledge of one or more
Windows/AD file system, registry functions and memory artifacts
Unix/Linux file systems and memory artifacts
Mac file systems and memory artifacts
Database, web application, cloud, or mobile device cyber incident response principals and techniques
Cybersecurity automation
Web servers and web applications.
SIEM (Splunk)
Security tools: IPS, Web proxy, Email proxy, pDNS, Deception, EDR etc....
Experience with one or more scripting languages (Powershell, Python, Bash, etc.)
Experience with integration of threat hunting and cyber threat intelligence into the incident response process
Experience with information security compliance audit frameworks and requirements e.g. PCI, FISMA, FedRAMP, SOC, SOX, PCI, GDPR and Data Privacy
Listing Details
- Citizenship: Top Secret
- Incentives: Bonus
- Education: Specialized Training
- Travel: No Travel
- Telework: No Telecommute