Sign Up Sign Up Log In Sign Up

Cyber Security Incident Response Analyst Tier 3

Job Description:

Leidos is seeking a Tier 3 Incident Response Analyst to join our team on a highly visible cyber security single-award IDIQ vehicle that provides security operations center
(SOC) support, cyber analysis, application development, and a 24x7x365 support staff.

Department of Homeland Security (DHS), Security Operations Center (SOC) Support Services is a US Government program responsible to monitor, detect, analyze, mitigate, and respond to cyber threats and adversarial activity on the DHS Enterprise. The DHS SOC has primary responsibility for monitoring and responding to security events and incidents detected at the Trusted Internet Connection (TIC) and Policy Enforcement Point (PEP) and is responsible for directing and
coordinating detection and response activities performed by each Component SOC. Direction and coordination are achieved through a new shared DHS incident tracking system and other means of coordination and communication. Duties will include investigating computer and information security incidents to determine extent of compromise to information and automated information systems, providing computer forensic and intrusion support to high technology investigations in the form of computer evidence seizure, computer forensic analysis, data recovery, and network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption. In addition, the Tier 3 Analyst will lead and mentor other SOC Support Staff and will communicate with executive leadership regarding matters of significant importance to the DHS SOC Support Services Program. The Analyst should have expertise in digital media forensics, malware analysis, monitoring and detection, incident response, compromise assessments to support detection, containment, and eradication of malicious activities targeting customer networks.

This is a 9AM to 5PM Monday thru Friday. Flexible start times are considered. Participates in rotating on call schedule.

EDUCATION & EXPERIENCE:

Requires Bachelor's Degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field and 12+ years of prior relevant experience, with Masters degree 10+ years of prior relevant experience. Without degree, 15+ years of prior relevant experience in the areas of incident detection and response, malware analysis, or cyber forensics required.

Minimum of current Secret with ability to obtain TS/SCI Clearance. In addition to specific security clearance requirements all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.

Must have at least one of the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE, GREM, GXPN, GMON or GCIH
ISC2: CCFP, CCSP, CISSP CERT CSIH
EC Council: CHFI, LPT, ECSA
Offensive Security: OSCP, OSCE, OSWP and OSEE
EnCase: EnCE
Defense Cyber Investigative Training Academy: FTK WFE-FTK, CIRC, WFE-E-CI, FIW

DESIRED SKILLS:

Experience in cyber government, and/or federal law enforcement. Cyber Kill Chain knowledge.

Company Name:
Security Clearance:
Secret
Location:
WASHINGTON, District of Columbia
Country:
United States
Salary:
Not Specified
Job Number:




Send me email alerts for similar jobs

JOIN US