Incident Response Analyst (w/ active TS)
at Critical Solutions
Ashburn, VA 20147, USA -
Start Date | Expiry Date | Salary | Posted On | Experience | Skills | Telecommute | Sponsor Visa |
---|---|---|---|---|---|---|---|
Immediate | 15 Feb, 2025 | USD 80000 Annual | 16 Nov, 2024 | 4 year(s) or above | Malware Analysis,Gcia,Intrusion Detection,Plus,Technical Reports,Incident Response,Communication Skills,Security Operations Center,Cloud,Information Technology,Computer Science,Teams,Eod,Cissp | No | No |
Required Visa Status:
Citizen | GC |
US Citizen | Student Visa |
H1B | CPT |
OPT | H4 Spouse of H1B |
GC Green Card |
Employment Type:
Full Time | Part Time |
Permanent | Independent - 1099 |
Contract – W2 | C2H Independent |
C2H W2 | Contract – Corp 2 Corp |
Contract to Hire – Corp 2 Corp |
Description:
JOB DESCRIPTION
Critical Solutions is seeking an Incident Response Analyst to support our Federal customer in Ashburn, VA.
BASIC QUALIFICATIONS:
- Active TOP SECRET clearance w/ SCI eligibility and must be able to obtain an Entry on Duty (EOD) to support the program.
- Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics.
- 4+ years of supervising and/or managing teams
- 5+ years of intrusion detection and/or incident handling experience
- CISSP and SANS GCIH or GCIA required upon start
- Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
- Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation
- Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations;
- Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
- Strong analytical and troubleshooting skills.
PREFERRED QUALIFICATIONS:
- Active TS/SCI
- Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
- Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
- Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
- Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
- Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
How To Apply:
Incase you would like to apply to this job directly from the source, please click here
Responsibilities:
- Recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
- Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
- Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
- Promote and drive implementation of automation and process efficiencies
- Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
- Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high-quality analysis and work products
- Establish trust and business relationships with customer and other relevant stakeholders
REQUIREMENT SUMMARY
Min:4.0Max:5.0 year(s)
Information Technology/IT
IT Software - Network Administration / Security
Other
Graduate
Incident detection and response malware analysis or cyber forensics
Proficient
1
Ashburn, VA 20147, USA