Listing Description
Key Role:
Apply an advanced understanding of monitoring, analyzing, detecting, and responding to cyber threat events and incidents in information systems and networks. Contribute to an integrated, dynamic cyber defense and leverage cybersecurity solutions to deliver cybersecurity operational services, including intrusion detection and prevention, situational awareness of network intrusions, security events, data spillage, and incident response actions. Provide leadership and mentoring for junior employees, contribute to the development of innovative principles and ideas, work on unusually complex problems, and provide solutions that are highly creative. Act as the leader on large programs and projects that affect the organization's long-term goals and objectives, lead investigations that form part of a wider diverse team of analysts, and conduct event detection, incident triage, incident handling, and remediation. Handle major, high-impact incidents, generate clear, concise recommendations, and coordinate activities and professional communications across a range of stakeholders. Work closely with security teams to develop, tune, automate, and enhance network and host-based security devices, support the SOC with managing the response to cyber intrusions, perform extensive network and host triage, maintain strict chain-of-custody protocols, analyze documentation and reports, and perform remediation, as required.
Basic Qualifications:
- 3+ years of experience with providing cyber incident response as part of a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC), or Security Operations Center (SOC)
- Experience with best practices, security tools, and techniques used by Cybersecurity teams
- Experience with performing host-based analysis of Windows, Linux, and Mac
- Experience with analyzing data from a variety of security tools and sources, including IDS alerts, firewall logs, weblogs, and network traffic logs to identify IOCs or malicious TTPs
- Ability to review alerts to determine relevancy and urgency and provide feedback and tuning recommendations
- Ability to identify, detect, respond, and mitigate sophisticated threats to the enterprise environment
- Top Secret clearance
- Associate's degree
- CySA+ Certification
Additional Qualifications:
- Experience with forensics tools, FTK, Encase, Wireshark, or SIFT
- Experience with creating custom Splunk dashboards and queries
- Experience with using Microsoft Excel
- Ability to discover and support new analytic methods for detecting threats
- Ability to be self-driven, work independently, and handle multiple tasks concurrently
- Ability to create reports for leadership
- Possession of excellent oral and written communication skills
- IAM Level III or IAT Level III Certification
Listing Details
- Salary: $93300 - $212000
- Citizenship: Top Secret
- Incentives: Not Provided
- Education: Associates Degree
- Travel: No Travel
- Telework: Hybrid Telecommute