SAIC
Tier II Cyber Incident Response Analyst
SAIC, Hines, Illinois, us, 60141
Description
Overview:
We are seeking a motivated, career and customer oriented Cyber Incident Response (CIR) Tier II Analyst interested in joining our Cyber Security Operations Center (CSOC) team in support of the Department of Veterans Affairs (VA). This is a Third Shift Position (10:30pm - 7am). (This is a 24/7/365 environment. Some weekends and holidays are possibly required per your schedule).
This is an onsite position working in either Hines, IL,
Martinsburg, WV.
Responsibilities:Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDRMake accurate determination of what alerts are false positives or require further investigation and prioritizationLead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents.Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrencesEnsure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooksCollaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholdersIdentify and action opportunities for tuning alerts to make the incident response team more efficientMonitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacyLeverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actionsSupport the mentoring and training of more junior IR staffStay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilitiesQualifications
Requirements:Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)3+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment.Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring toolsExperience with enterprise ticketing systems like ServiceNow.Excellent analytical and problem-solving skills.Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight.Ability to learn and function in multiple capacities and learn quickly.Strong verbal and written communication skillsMust currently have or be willing to obtain one of the following certifications (or equivalent):GIAC Certified Incident HandlerEC-Council's Certified Incident Handler (E|CIH)GIAC Certified Incident Handler (GCIH)Incident Handling & Response Professional (IHRP)Certified Computer Security Incident Handler (CSIH)Certified Incident Handling Engineer (CIHE)EC-Council's Certified Ethical HackerTarget salary range: $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.
Overview:
We are seeking a motivated, career and customer oriented Cyber Incident Response (CIR) Tier II Analyst interested in joining our Cyber Security Operations Center (CSOC) team in support of the Department of Veterans Affairs (VA). This is a Third Shift Position (10:30pm - 7am). (This is a 24/7/365 environment. Some weekends and holidays are possibly required per your schedule).
This is an onsite position working in either Hines, IL,
Martinsburg, WV.
Responsibilities:Perform real-time monitoring and triage of security alerts in Cybersecurity toolsets including SIEM, and EDRMake accurate determination of what alerts are false positives or require further investigation and prioritizationLead and actively participate in the investigation, analysis, and resolution of cybersecurity incidents.Analyze attack patterns, determine the root cause, and recommend appropriate remediation measures to prevent future occurrencesEnsure accurate and detailed documentation of incident response activities, including analysis, actions taken, and lessons learned. Collaborate with knowledge management teams to maintain up-to-date incident response playbooksCollaborate effectively with cross-functional teams, including forensics, threat intelligence, IT, and network administrators. Clearly communicate technical information and incident-related updates to management and stakeholdersIdentify and action opportunities for tuning alerts to make the incident response team more efficientMonitor the performance of security analytics and automation processes regularly, identifying areas for improvement and taking proactive measures to enhance their efficacyLeverage Security Orchestration, Automation, and Response (SOAR) platforms to streamline and automate incident response processes, including enrichment, containment, and remediation actionsSupport the mentoring and training of more junior IR staffStay informed about the latest cybersecurity threats, trends, and best practices. Actively participate in cybersecurity exercises, drills, and simulations to improve incident response capabilitiesQualifications
Requirements:Bachelor's degree in computer science, Cybersecurity, Information Technology, or a related field (or equivalent work experience)3+ years of experience supporting incident response in an enterprise-level Security Operations Center (SOC)A deep understanding of cybersecurity principles, incident response methodologies, and a proactive mindset to ensure our SOC operates effectively in a high-pressure environment.Strong experience with security technologies, including SIEM, IDS/IPS, EDR, and network monitoring toolsExperience with enterprise ticketing systems like ServiceNow.Excellent analytical and problem-solving skills.Ability to work independently and in a team environment to identify errors, pinpoint root causes, and devise solutions with minimal oversight.Ability to learn and function in multiple capacities and learn quickly.Strong verbal and written communication skillsMust currently have or be willing to obtain one of the following certifications (or equivalent):GIAC Certified Incident HandlerEC-Council's Certified Incident Handler (E|CIH)GIAC Certified Incident Handler (GCIH)Incident Handling & Response Professional (IHRP)Certified Computer Security Incident Handler (CSIH)Certified Incident Handling Engineer (CIHE)EC-Council's Certified Ethical HackerTarget salary range: $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
SAIC accepts applications on an ongoing basis and there is no deadline.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.