Today
Secret
Unspecified
Unspecified
IT - Security
Remote/Hybrid• (Off-Site/Hybrid)
Description
SAIC is seeking a Cyber Incident Response Analyst to be a critical member of the RITS team providing remote customer support.
This role offers work from home / remote / virtual work at home
Responsibilities Include:
Qualifications
Required Education and Experience:
Required Clearance:
Required Certification: Must have any one of the following CSSP-IR(CyberSecurity Service Provider-Incident Responder) certifications:
Target salary range: $40,001 - $80,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
SAIC is seeking a Cyber Incident Response Analyst to be a critical member of the RITS team providing remote customer support.
This role offers work from home / remote / virtual work at home
Responsibilities Include:
- Providing analysis and monitoring for all systems and environments to ensure the availability, integrity, and confidentiality of the data processed, stored, and transmitted via a centralized support monitoring service. Analysis and monitoring shall be automated to the maximum extent possible.
- Providing continuous monitoring of malware protection and detection mechanisms.
- Providing administrator access to the designated Government POCs as required.
- Providing active monitoring of the operational status, health, and performance of the monitoring tools and devices.
- Actively monitoring vendor feeds, Army feeds, tippers, OPORDS, sensor grids, and intelligence feeds for new signature information.
- Analyzing the information provided and providing recommendations for inclusion into the CorpsNet, and SIPRNet environments, while maintaining the classification of information.
- Providing performance measurements, logs, and information feeds from the security monitoring systems (e.g., HBSS and IPS).
- Maintaining access to current network architecture diagrams per DISA standards showing placement of sensors (e.g., IDS/IPS, Routers, Netflow/PCAP systems, firewall, etc.).
- Reporting on access to assets, including, but not limited to, network and host-based sensors for CorpsNet, CorpsNet extended network (JRSS and cloud), and SIPRNet.
- Integrating and correlating data from USACE systems, servers, services, SIEM, and end points to measure, monitor, remediate, and remove threats to the environment in accordance with USACE OCIO/G-6 directives.
Qualifications
Required Education and Experience:
- Bachelors and two (2) years or more experience; OR Masters and 0 years of experience; OR four (4) years of experience accepted in lieu of degree;
Required Clearance:
- Must have an Interim Secret clearance with ability to obtain and maintain a Secret clearance.
Required Certification: Must have any one of the following CSSP-IR(CyberSecurity Service Provider-Incident Responder) certifications:
- CEH - Certified Ethical Hacker
- CySA+ - Cybersecurity Analyst Plus
- CFR - CyberSec First Responder
- CCNA Cyber Ops - (Cisco Certified Network Associate)
- CCNA-Security
- CHFI - Computer Hacking Forensic Investigator
- GCFA - GIAC Certified Forensic Analyst
- GCIH - GIAC Certified Incident Handler
- SCYBER
- PenTest+
Target salary range: $40,001 - $80,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
group id: 10111346