ManTech
Cyber Security Engineer
ManTech, Mc Lean, Virginia, us, 22107
ManTech
is seeking a highly skilled and motivated Cyber Detection and Response Analyst to join our dynamic Cyber Incident Response Team. As a key member of the team, you will be responsible for proactively monitoring, detecting, analyzing, and responding to cybersecurity incidents within our large enterprise network. Your expertise in incident detection, analysis, and response will play a vital role in safeguarding our organization's critical assets and ensuring the integrity of our information systems.
Responsibilities include, but are not limited to: Incident Detection and Monitoring:
Utilize SIEM (Security Information and Event Management) systems and other detection technologies to identify and investigate security anomalies. Collaborate with other teams to establish and fine-tune detection rules and alerts.
Incident Analysis and Investigation:
Conduct in-depth analysis of detected incidents to determine the nature, extent, and impact of the cybersecurity threats. Perform forensic analysis, including examining network traffic, log files, and system artifacts, to identify the root cause and potential entry points of incidents. Document incident findings, including the attack methodology, IOCs, and recommended mitigation measures. Collaborate with cross-functional teams, such as network engineers, system administrators, and legal representatives, to gather and analyze relevant information during incident investigations.
Incident Response and Mitigation:
Execute the incident response process, following established procedures and protocols, to contain, mitigate, and remediate security incidents. Coordinate with internal teams and external stakeholders to ensure a swift and effective response to incidents, including communication, containment, and recovery activities. Utilize incident response tools and technologies to facilitate the investigation, containment, and eradication of threats. Provide recommendations for remediation actions and improvements to security controls and processes based on incident findings and lessons learned.
Threat Intelligence and Vulnerability Management:
Stay up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices. Monitor external sources for threat intelligence and emerging trends to enhance the organization's incident detection and response capabilities. Contribute to vulnerability management activities by assessing and prioritizing vulnerabilities and providing guidance on remediation strategies.
Reporting and Documentation:
Prepare clear and concise incident reports, including detailed timelines, analysis, and recommendations for senior management and relevant stakeholders. Maintain accurate and up-to-date documentation of incidents, investigations, actions taken, and lessons learned. Assist in the development and maintenance of incident response playbooks, procedures, and guidelines.
Basic Qualifications: 2+ years of experience in Cybersecurity, Information Technology, Computer Science or other relevant technical field; experience can be any combination of professional experience, internships, lab work or coursework. Experience with one or more of the following: SIEM systems, network security tools, log analysis tools, cybersecurity principles, incident detection, analysis, and response methodologies, operating systems, network protocols, and security technologies. DoD 8570 IAT-II required (can be obtained after hire). Security Requirements: Active/Current TS/SCI with polygraph.
#J-18808-Ljbffr
is seeking a highly skilled and motivated Cyber Detection and Response Analyst to join our dynamic Cyber Incident Response Team. As a key member of the team, you will be responsible for proactively monitoring, detecting, analyzing, and responding to cybersecurity incidents within our large enterprise network. Your expertise in incident detection, analysis, and response will play a vital role in safeguarding our organization's critical assets and ensuring the integrity of our information systems.
Responsibilities include, but are not limited to: Incident Detection and Monitoring:
Utilize SIEM (Security Information and Event Management) systems and other detection technologies to identify and investigate security anomalies. Collaborate with other teams to establish and fine-tune detection rules and alerts.
Incident Analysis and Investigation:
Conduct in-depth analysis of detected incidents to determine the nature, extent, and impact of the cybersecurity threats. Perform forensic analysis, including examining network traffic, log files, and system artifacts, to identify the root cause and potential entry points of incidents. Document incident findings, including the attack methodology, IOCs, and recommended mitigation measures. Collaborate with cross-functional teams, such as network engineers, system administrators, and legal representatives, to gather and analyze relevant information during incident investigations.
Incident Response and Mitigation:
Execute the incident response process, following established procedures and protocols, to contain, mitigate, and remediate security incidents. Coordinate with internal teams and external stakeholders to ensure a swift and effective response to incidents, including communication, containment, and recovery activities. Utilize incident response tools and technologies to facilitate the investigation, containment, and eradication of threats. Provide recommendations for remediation actions and improvements to security controls and processes based on incident findings and lessons learned.
Threat Intelligence and Vulnerability Management:
Stay up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices. Monitor external sources for threat intelligence and emerging trends to enhance the organization's incident detection and response capabilities. Contribute to vulnerability management activities by assessing and prioritizing vulnerabilities and providing guidance on remediation strategies.
Reporting and Documentation:
Prepare clear and concise incident reports, including detailed timelines, analysis, and recommendations for senior management and relevant stakeholders. Maintain accurate and up-to-date documentation of incidents, investigations, actions taken, and lessons learned. Assist in the development and maintenance of incident response playbooks, procedures, and guidelines.
Basic Qualifications: 2+ years of experience in Cybersecurity, Information Technology, Computer Science or other relevant technical field; experience can be any combination of professional experience, internships, lab work or coursework. Experience with one or more of the following: SIEM systems, network security tools, log analysis tools, cybersecurity principles, incident detection, analysis, and response methodologies, operating systems, network protocols, and security technologies. DoD 8570 IAT-II required (can be obtained after hire). Security Requirements: Active/Current TS/SCI with polygraph.
#J-18808-Ljbffr