T2 Deputy IR Lead at Critical Solutions
Ashburn, VA 20147, USA -
Full Time


Start Date

Immediate

Expiry Date

04 Jul, 25

Salary

136000.0

Posted On

04 Apr, 25

Experience

3 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Cnd, It, Bash, Visual Basic, Computer Forensics, Python, Federal Government, Addition, Law Enforcement, Powershell, Malware Analysis

Industry

Information Technology/IT

Description

T2 DEPUTY IR LEAD

Location: Ashburn, VA
Clearance: Must be a US citizen and must be willing and be able to favorably pass a (BI) Background Investigation
Full-time, On-site

JOB DESCRIPTION

Critical Solutions has an immediate opening for a Tier 2 Incident Response Lead to support our federal customer in Ashburn, VA.

BASIC QUALIFICATIONS:

  • Must be a US citizen, no clearance required, prefer Secret Clearance with the ability to obtain TS/SCI. In addition to specific security clearance requirements, selected candidate will be required to successfully complete a Background Investigation to support this program
  • Bachelor’s degree in Science or Engineering Field, IT, or Cybersecurity or related field
  • 3+ years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.
  • Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.
  • Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell

PREFERRED QUALIFICATIONS:

  • Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC role
  • Cyber Kill Chain Knowledge
Responsibilities
  • Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
  • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
  • Lead Incident Response activities and mentor junior SOC staff.
  • Work with key stakeholders to implement remediation plans in response to incidents.
  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Strong problem solving abilities with an analytic and qualitative eye for reasoning
  • Ability to independently prioritize and complete multiple tasks with little to no supervision
Loading...