No more applications are being accepted for this job
- No third party candidates
- Must be flexible according to agency needs on Two Nights per week
- Active Top Secret with SCI eligibility required
- Ability to be onsite and support Weekend night shift, 10 PM - 10 AM EST
- Minimum of four (4) years of general work experience and three (3) years of relevant experience in functional responsibility
- Bachelor's Degree, or an equivalent combination of formal education, experience
- Experience in the following tools and technologies:
- BRO IDS
- Splunk SIEM
- RSA Netwitness
- FireEye
- Sourcefire (Snort)
- CrowdStrike EDR
- Fidelis XPS
- Strong analytical and organizational skills
- Strong verbal and written communication skills
- Experience with MS Word and other MS Office Applications
- Experience with securing various environments preferred
- Experience working a SOC and doing incident response is preferred
- Experience and education preferred in eCPPT, OSCP, GCFW, GCIH, other relevant IT security certifications, or advanced vendor certifications such as Splunk Certified Architect or SourceFire Certified Administrator; Security+, GSEC, or other relevant IT security product certifications such as Tenable Certified Nessus Auditor, or SnortCP; CISSP, CISM, or ISO 27001
- Provides support for complex computer network exploitation and defense techniques to include deterring, identifying, and investigating computer and network intrusions; providing incident response and remediation support;
- Performing comprehensive computer surveillance/monitoring, identifying vulnerabilities; developing secure network designs and protection strategies, and audits of information security infrastructure.
- Provides technical support for continuous monitoring, computer exploitation and reconnaissance; target mapping and profiling; and, network decoy and deception operations in support of computer intrusion defense operations.
- Provides technical support for forensics services to include evidence seizure, computer forensic analysis, and data recovery, in support of computer crime investigation.
- Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures, and trends.
- Performs research into emerging threat sources and develops threat profiles.
- Provides technical support for a comprehensive risk management program identifying mission-critical processes and systems; current and projected threats; and system vulnerabilities.
Part Time Weekends TS/SCI Tier 2 Incident Response Analyst - Washington, United States - GovStaff
Description
TS/SCI Tier 2 Incident Response OperatorWeekend Nights Saturday or Sunday 10pm - 10am
Ad hoc shift with potential hours from 24-96 per month
Do you hold a TS/SCI clearance and are looking to jump start your cyber security career with some part time work in the field? Or maybe you're looking for weekend night side gig. If so, we may have the perfect opportunity for your those interests as part of a Help Desk Incident Response team in Washington, DC.
The Incident Response Analyst will provide the agency with a fully comprehensive array of analytical activities in support of external threat monitoring, detection, event analysis, and incident reporting efforts including presentation reviews, internal and external threat reporting, analysis of inbound and outbound public internet traffic, suspicious e-mail messages, administering access request to specific public sites, communicating and coordinating the characterization of events and the response.
CANDIDATE QUALIFICATIONS:
If you feel this role may meet your experience and interests, please apply. We'll open a line of discussion and if this position does not meet your interests or the requirements, we'll gladly hang onto your profile in the event another position opens that could be a fit for your needs. GovStaff, and all our business partners, adhere to EEOC regulations.