Yesterday
Top Secret
Early Career (2+ yrs experience)
IT - Security
Huntsville, AL (On-Site/Office)•Clarksburg, WV (On-Site/Office)•Washington, DC (On-Site/Office)
Paradyme is seeking experienced Cyber Defense Incident Responders for upcoming projects in support of major federal law enforcement and intelligence customers. The people in these positions will work in secured federal facilities in: Washington, DC; Huntsville, AL; and Clarksburg, WV.
A current TOP SECRET clearance is required to be considered.
In our teams, the Incident Responder performs duties on Blue and Purple Team operations. Applying both hands-on technical skills, the Responder proactively and reactively defends against cyber threats in critical moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure.
Key Responsibilities:
Perform vulnerability assessments, incident response, and threat hunting operations
Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies
Able to execute strategic security plans aligned with threat intelligence and operational priorities
Threat Intelligence and Risk Assessment
Interprets threat intelligence based on real-world risks
Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure
Maintain current knowledge of the evolving threat landscape and integrate insights into operations
Threat Hunting and Incident Response
Perfrom proactive threat hunting to detect and mitigate emerging threats
Recommend and implement advanced methodologies for tracking threat actors and reducing exposure
Support rapid and effective incident response efforts across networks
Collaboration and Cross-Team Integration
Participates in collaboration between Red, Blue, and Purple Teams to enhance overall security posture
Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning
Tools and Techniques
Use approved tools and techniques for vulnerability assessments and threat detection
Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities
Required Qualifications:
Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Technology, or related field
3-5 years of experience in Cybersecurity operations
Proven experience in incident response, threat hunting, and vulnerability management
Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.)
Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell)
Excellent communication and collaboration skills
Preferred Qualifications:
Industry certifications
CISSP
GIAC (GCIA, GCIH, GNFA, etc.)
OSCP, or similar
Experience working in federal or intelligence community environments
Familiarity with ICS/SCADA systems and critical infrastructure protection
A current TOP SECRET clearance is required to be considered.
In our teams, the Incident Responder performs duties on Blue and Purple Team operations. Applying both hands-on technical skills, the Responder proactively and reactively defends against cyber threats in critical moments. The ideal candidate has hand-on experience with advanced threat detection, incident response, and collaborative security assessments to protect critical government customer systems and infrastructure.
Key Responsibilities:
Perform vulnerability assessments, incident response, and threat hunting operations
Support Purple Team initiatives by integrating offensive (Red Team) and defensive (Blue Team) strategies
Able to execute strategic security plans aligned with threat intelligence and operational priorities
Threat Intelligence and Risk Assessment
Interprets threat intelligence based on real-world risks
Conduct risk-based evaluations of critical systems, networks, and Industrial Control Systems (ICS) infrastructure
Maintain current knowledge of the evolving threat landscape and integrate insights into operations
Threat Hunting and Incident Response
Perfrom proactive threat hunting to detect and mitigate emerging threats
Recommend and implement advanced methodologies for tracking threat actors and reducing exposure
Support rapid and effective incident response efforts across networks
Collaboration and Cross-Team Integration
Participates in collaboration between Red, Blue, and Purple Teams to enhance overall security posture
Work closely with Senir Analysts across technical domains to ensure comprehensive assessments and planning
Tools and Techniques
Use approved tools and techniques for vulnerability assessments and threat detection
Stay connected with on-going evaluation of new tools and technologies to enhance team capabilities
Required Qualifications:
Bachelor’s or Master’s degree in Cybersecurity, Computer Science, Information Technology, or related field
3-5 years of experience in Cybersecurity operations
Proven experience in incident response, threat hunting, and vulnerability management
Understanding of threat intelligence, risk assessment methodologies, and adversary tactics (MITRE ATT&CK, etc.)
Knowledge of SIEMs, EDRs, forensic tools, and scripting languages (e.g., Python, PowerShell)
Excellent communication and collaboration skills
Preferred Qualifications:
Industry certifications
CISSP
GIAC (GCIA, GCIH, GNFA, etc.)
OSCP, or similar
Experience working in federal or intelligence community environments
Familiarity with ICS/SCADA systems and critical infrastructure protection
group id: 10477716