Posted today
Top Secret/SCI
Mid Level Career (5+ yrs experience)
$120,000 - $130,000
IT - Security
Washington, DC (Off-Site/Hybrid)
Responsibilities
• Utilize state-of-the-art technologies such as host forensics tools(FTK/Encase), Endpoint Detection and Response tools, log analysis (Elastic), and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
• Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
• Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response.
• Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
• Lead Incident Response activities and mentor junior SOC staff.
• Work with key stakeholders to implement remediation plans in response to incidents.
• Effectively investigate and identify root cause findings, then communicate findings to stakeholders, including technical staff, and leadership.
Requirements:
• Demonstrated 7 years of experience in Cyber Security and/or Cyber Defense.
• Working knowledge of DoD Incident response standards and methodologies
• Flexible and adaptable self-starter with strong relationship-building skills
• Strong problem-solving abilities with an analytic and qualitative eye for reasoning
• Ability to independently prioritize and complete multiple tasks with little to no supervision
• Must possess a DOD 8570 IAT III qualifying certification
• Must possess one more of the following CSSP-IR qualifying certifications are preferred:
• CFR
• CEH
• CCNA Cyber Ops
• CCNA-Security
• CySA+
• CHFI
• GCIH
• GCFA
• SCYBER
• PenTest+
• Utilize state-of-the-art technologies such as host forensics tools(FTK/Encase), Endpoint Detection and Response tools, log analysis (Elastic), and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
• Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
• Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response.
• Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
• Lead Incident Response activities and mentor junior SOC staff.
• Work with key stakeholders to implement remediation plans in response to incidents.
• Effectively investigate and identify root cause findings, then communicate findings to stakeholders, including technical staff, and leadership.
Requirements:
• Demonstrated 7 years of experience in Cyber Security and/or Cyber Defense.
• Working knowledge of DoD Incident response standards and methodologies
• Flexible and adaptable self-starter with strong relationship-building skills
• Strong problem-solving abilities with an analytic and qualitative eye for reasoning
• Ability to independently prioritize and complete multiple tasks with little to no supervision
• Must possess a DOD 8570 IAT III qualifying certification
• Must possess one more of the following CSSP-IR qualifying certifications are preferred:
• CFR
• CEH
• CCNA Cyber Ops
• CCNA-Security
• CySA+
• CHFI
• GCIH
• GCFA
• SCYBER
• PenTest+
group id: 91092480