-
Incident Response Analyst
2 days ago
MindPoint Group Washington, United StatesMindPoint Group is seeking a Security Operations Center (SOC) Analyst that will collaborate with members of the SOC team to improve procedures for the SOC to enhance coordination and incident response operations. You must be willing to work in a 24x7x365 SOC environment demonstra ...
-
Incident Response Analyst
3 days ago
MindPoint Group Washington, United StatesMindPoint Group is seeking a Tier 2 Incident Response Analyst to support threat monitoring, detection, event analysis, and incident reporting. The Security Operations Center is a 24/7 environment. You will be responsible for monitoring enterprise networks and systems, detecting e ...
-
Detection and Response Analyst
2 weeks ago
Knewin Arlington, United StatesDetection & Response Analyst · We are looking for people with a passion for investigation and forensic analysis to join our MDR SOC team at Rapid7. As a Detection & Response Analyst, you will utilize Rapid7's advanced tools to investigate and triage security events and work side- ...
-
MindPoint Group Washington, United StatesText code IRAWD to to apply · MindPoint Group delivers industry-leading cybersecurity solutions, services, and products. We are trusted cybersecurity advisors to key government and commercial decision-makers and support security operations for some of the most security-conscious ...
-
Incident Response Analyst
2 days ago
XOR Security Arlington, United StatesJob Title: Incident Response Analyst · Location: 1110 N. Glebe Rd. Arlington, Virginia 22201 · Clearance Level: Top Secret · SUMMARY: · XOR Security, An Agile Defense Company is currently seeking an Incident Response Analyst with advanced skillsets in Digital Forensic & Incid ...
-
Detection and Response Analyst
11 hours ago
Rapid7 Arlington, United States Full timeDetection & Response Analyst · We are looking for people with a passion for investigation and forensic analysis to join our MDR SOC team at Rapid7. As a Detection & Response Analyst, you will utilize Rapid7's advanced tools to investigate and triage security events and work side- ...
-
Incident Response Analyst
2 days ago
Computer World Services (CWS)Corporation Washington DC, United States· Job Description · The mission of the OFR is to support the Financial Stability Oversight Council (FSOC) in promoting financial stability by: collecting data on behalf of FSOC; providing such data to FSOC and member agencies; standardizing the types and formats of data report ...
-
Financial Analyst, Audit Response
6 days ago
Na Oiwi Kane Quantico, United States**Job Title**:Financial Analyst, Audit Response · **Location**:Quantico, Virginia · **Security Clearance**: T1/NACI · **Introduction**: · Rivet Operations Company has an opening for a detail-oriented Financial Analyst to join the DoD's premier Audit Response team in the Quantico, ...
-
Financial Analyst, Audit Response
1 week ago
Na Oiwi Kane Quantico, United States**Job Title**:Financial Analyst, Audit Response · **Location**:Quantico, Virginia · **Security Clearance**: T1/NACI · **Introduction**: · Rivet Operations Company has an opening for a detail-oriented Financial Analyst to join the DoD's premier Audit Response team in the Quantico, ...
-
Cyber Incident Response Analyst
1 day ago
Leidos Ashburn, United States**Description** · Our Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the government Enterprise. We have primary responsibility for monitoring ...
-
Cyber Incident Response Analyst
2 weeks ago
Peraton Arlington, United StatesResponsibilities: · Peraton is currently hiring a Cyber Incident Response Analyst for its' Federal Strategic Cyber sector. · Location: On-site, Arlington, VA · In this role, you will have the following duties: · Identify, log, categorize, perform initial triage, assign to ot ...
-
Cyber Incident Response Analyst
2 days ago
Peraton Arlington, United States Full timeResponsibilities · Peraton is currently hiring a Cyber Incident Response Analyst for its' Federal Strategic Cyber sector. · Location: Arlington, VA - on-site. · Full-time, Weekends Shift · In this role: Duties include ingesting, identifying, logging, categorizing, performing in ...
-
Cyber Incident Response Analyst
2 days ago
Peraton Arlington, United States Full timeResponsibilities · Peraton is currently hiring a Cyber Incident Response Analyst for its' Federal Strategic Cyber sector. · Location: On-site, Arlington, VA · In this role, you will have the following duties:Identify, log, categorize, perform initial triage, assign to other team ...
-
Incident Response Analyst
1 week ago
Computer World Services (CWS)Corporation Washington, United States OTHER· Job Description · The mission of the OFR is to support the Financial Stability Oversight Council (FSOC) in promoting financial stability by: collecting data on behalf of FSOC; providing such data to FSOC and member agencies; standardizing the types and formats of data reporte ...
-
Base One Technologies Arlington, United StatesRequired Education/Experience · BS degree in Science, Technology, Engineering, Math or related field and 8+ years of prior relevant experience with a focus on cybersecurity OR Masters with 4-6 years of prior relevant experience. Primary Responsibilities · Our govt client has an i ...
-
Cyber Incident Response Analyst
1 day ago
RedTrace Technologies Inc Washington, United StatesJob Description · Job DescriptionSECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY · ***POSITION REQUIRES US CITIZENSHIP*** · Company Overview: As a Cybersecurity, Information Technology, and Management Consulting firm focused on assisting our commercial and U.S. Intellige ...
-
Incident Response Analyst
4 days ago
Edgewater Federal Solutions Bethesda, United StatesOverview: · Edgewater is seeking an Incident Response Analyst to provide support to an Edgewater Federal government contract. · Responsibilities: · As a Incident Response Analyst, you and team will be responsible for: · Manning a 24x7x365 cybersecurity operations center and r ...
-
Incident Response Analyst with OT/ICS/SCADA
1 week ago
Peraton Arlington, United StatesAbout Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deli ...
-
Incident Response Analyst with OT/ICS/SCADA
1 week ago
Peraton Arlington, United StatesAbout Peraton Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. As the world's leading mission capability integrator and transformative enterprise IT provider, we deli ...
-
Incident Response Analyst with OT/ICS/SCADA
2 weeks ago
STEMBoard Arlington, United StatesCurrently hiring an experienced Incident Response Analyst with OT/ICS/SCADA experience for its' Federal Strategic Cyber program in Arlington, VA. · (Ideal candidate needs to be amenable to travel, approximately 40%) · In this role, you will: · + Respond to cybersecurity incidents ...
Incident Response Analyst - Arlington, United States - XOR Security
Description
Job Title:
Incident Response Analyst
Location:
1110 N. Glebe Rd. Arlington, Virginia 22201
Clearance Level:
Top Secret
SUMMARY:
XOR Security, An Agile Defense Company is currently seeking an
Incident Response Analyst
with advanced skillsets in Digital Forensic & Incident Response (DFIR), Cyber Hunting and operate cyber security capabilities for a variety of federal customers and critical infrastructure entities.
Candidates should have excellent written and oral communication skills, be able to work independently and as part of a team, with demonstrated leadership capabilities.
Primary skillsets and experience include Hunt, Digital Forensic & Incident Response, Malware/Firmware Analysis, within Operational Technology environments (skills in more than one cyber discipline are preferred) are required for this position.
The ideal candidate will have hands-on experience supporting a team of skilled, technical resources focused on as an analyst or infrastructure admin, experience as a technical team lead within the Security Operation Center.
A solid understanding of cyber threats, ICS Kill Chain, MITRE ATT&CK for ICS, PERA Model and information security in the domains of TTP's, Threat Actors, Campaigns, and Observables.
Additionally, the ideal candidate would be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management.
Corporate duties such as solution/proposal development, corporate culture development, mentoring employees, supporting recruiting efforts, will also be required. In addition, flexibility in work locations within the DC Metro Area and performing varying duties is a must.
JOB DUTIES AND RESPONSIBILITIESJob duties include:Travel up to forty (20%) percent of the time to support Incident Response and Cyber HuntsContribute or manage a hunt to provide cyber hunt and incident response to Critical Infrastructure entities providing comprehensiveConduct quality assurance reviews of all activities through reviewing of metrics and case analysisServe as a technical OT/IT Cyber Hunt SME and onsite task leadLead a technical team that performs the followingrespond to and identify cybersecurity incidents within OT/IT environments and provide recommendations to affected entities to prevent the reoccurrence of these incidents within a variety of critical infrastructure sectors.applies specific functional knowledge to resolve cybersecurity incidents and perform proactive threat hunts.
Develop or contribute to solutions to a variety of problems of moderate scope and complexity.provides industry experience and expertise for one or multiple critical infrastructure sectors/sub-sectors, including but not limited to Power, Water, Transporation, and Manufacturingfollows pre-defined procedures for Incident Response and Cyber Hunts.provides expertise to define procedures for response to customer cyber security incident in the industrial control system environment.applies tailored incident response and threat hunting tradecraft to industrial control system/critical infrastructure environments-with a deep understanding of the nuance and constraints of industrial environments.
Seamlessly work alongside a team of host, network, and cloud forensic analysts to meet the mission requirements for both incident response and threat hunting engagements.
Serves as liaison with various customers (internal and external)Acts as a subject-matter expert to multiple tasks and/or programsBe involved with highly technical operations and forensic analysis and serve as consultants, continuously advising client decision makers.
Maintain accurate records of incident response activities and findings.Prepare and deliver incident reports to management and stakeholders.
Research, evaluate, recommend, and design new security technologies and supporting infrastructureDevelop technical cyber security solutions in response to customer requests or in support of proposal solution developmentProvide technical writing support in support of corporate response to RFPs/RFQs from various customersSupport new XOR engagements as transitional program or operations leadSupport documentation of all business and workflow processes in this areaProvides technical consultation in cyber security capability developmentMaintains current knowledge of relevant cyber security and related technologies as assignedQUALIFICATIONS
Education, Background, and Years of Experience
At least 5 years of experience in a cyber network defense environment performing analysis and engineer functions and 2 years of experience as a team lead or operations managementBachelor's Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, or Electrical EngineeringADDITIONAL SKILLS & QUALIFICATIONSRequired Skills
Candidate must have the required Qualifications:At least 5 years of experience in a cyber network defense environment performing analysis and engineer functions and 2 years of experience as a team lead or operations managementBachelor's Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, or Electrical Engineering.
Be a Self-starter with strong attention to detail and critical thinking ability.
Have a strong customer-service orientation with excellent written and oral communication skills.
The ability to self-teach and self-test new tools and methodologies, and to problem-solve independently.
There is an onsite requirement for minimum one day (1) week, with up to 3 days depending on situational requirements.
Strong analytical and technical skills in computer network defense operations, triage, investigation, and incident response effortsPrevious hands-on experience with a Security Information and Event Monitoring (SIEM) platforms and log management systems that perform log collection, analysis, correlation, and alerting (preferably within Splunk or Elk).Prior experience and ability to with analyzing information technology security events to discern events that qualify as a legitimate security incident as opposed to non-incidents.
This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.Existing Subject Matter Expertise of Advanced Persistent Threat or Emerging Threats.
Strong proficiency in report writing and briefing senior managementExcellent organizational and attention to details in tracking activities within various Security Operation workflows.
Preferred SkillsExperience in mentoring and training mid-level and senior analysts
Certifications:
GREM, GFCA GISCP, GRID, GCIA, or GCIA, OSCP, GPEN.Experience on USG Cyber Protection Teams, a plus.
Experience performing digital forensics and analysis on a variety of vendor/OEM equipment-including but not limited to laptop/desktops, servers PLC's, HMI's, Historians, and related SCADA systems.
Experience with SIEM (Splunk) -threat hunting, analytic development, dashboards, and reporting.Ability to automate simple/repeatable but critical tasks using scripting language (Python, Powershell)WORKING CONDITIONSEnvironmental Conditions
Hours:
Monday - Friday, with 20% of travelStrength Demands
Light - 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs.
A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical RequirementsStand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel
Closing Statement :
XOR Security, an Agile Defense Company
offers a very competitive benefits package including health insurance coverage from the first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.
is an Equal Opportunity Employer (EOE). M/F/D/V.
Citizenship Clearance RequirementApplicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP and PUBLIC TRUST CLEARANCE REQUIRED.
#J-18808-Ljbffr