Critical Solutions
Incident Response Analyst (w/ active TS)
Critical Solutions, Ashburn, Virginia, United States, 22011
INCIDENT RESPONSE ANALYST (w/ active TS)
Location: Ashburn, VAPotential for Telework: NoClearance: Top Secret w/ SCI eligibility
JOB DESCRIPTION
Critical Solutions is seeking an
Incident Response Analyst
to support our Federal customer in Ashburn, VA.
PRIMARY ROLES AND RESPONSIBILITIES:
Recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
Promote and drive implementation of automation and process efficiencies
Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high-quality analysis and work products
Establish trust and business relationships with customer and other relevant stakeholders
BASIC QUALIFICATIONS:
Active TOP SECRET clearance w/ SCI eligibility
and must be able to obtain an Entry on Duty (EOD) to support the program.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics.
4+ years of supervising and/or managing teams
5+ years of intrusion detection and/or incident handling experience
CISSP and SANS GCIH or GCIA required upon start
Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation
Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations;
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Strong analytical and troubleshooting skills.
MUST HAVE ONE OF THE FOLLOWING CERTIFICATIONS:
CCFP - Certified Cyber Forensics Professional
CCNA Security
CCNP Security
CEH - Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
CISSP - Certified Information Systems Security
CIRC
ECES - EC-Council Certified Encryption Specialist
ECIH - EC-Council Certified Incident Handler
ECSA - EC-Council Certified Security Analyst
ECSS - EC-Council Certified Security Specialist
EnCE
ENSA - EC-Council Network Security Administrator
FIWE
GCFA - Forensic Analyst
GCFE - Forensic Examiner
GCIH - Incident Handler
GISF - Security Fundamentals
GNFA - Network Forensic Analyst
GREM - Reverse Engineering Malware
GWEB - Web Application Defender
GXPN - Exploit Researcher and Advanced Penetration Tester
LPT - Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSEE (Exploitation Expert)
OSWP (Wireless Professional)
WFE-E-CI
FTK-WFE-FTK
CompTIA Cyber Security Analyst (CySA+)
CompTIA Linux Network Professional (CLNP)
CompTIA PenTest+
GCTI - Cyber Threat Intelligence
GOSI - Open Source Intelligence
CTIA - Certified Threat Intelligence Analyst
Splunk Core Certified Advanced Power User
Splunk Core Certified Consultant
Splunk SOAR Certified Automation Developer
IACRB Certified Security Awareness Practitioner (CSAP)
PREFERRED QUALIFICATIONS:
Active TS/SCI
Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
LOCATION:
On customer site in Ashburn, VA.
Must be willing and able to commute to Ashburn, VA
CLEARANCE REQUIREMENT:
US Citizen and possess an active DOD Top Secret Clearance.
Selected applicant will be required to undergo background investigation and finger printing by the federal agency and must meet the eligibility requirements.
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $80,000 - $103,000. The salary range for this position represents the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more.
#J-18808-Ljbffr
Location: Ashburn, VAPotential for Telework: NoClearance: Top Secret w/ SCI eligibility
JOB DESCRIPTION
Critical Solutions is seeking an
Incident Response Analyst
to support our Federal customer in Ashburn, VA.
PRIMARY ROLES AND RESPONSIBILITIES:
Recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
Promote and drive implementation of automation and process efficiencies
Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high-quality analysis and work products
Establish trust and business relationships with customer and other relevant stakeholders
BASIC QUALIFICATIONS:
Active TOP SECRET clearance w/ SCI eligibility
and must be able to obtain an Entry on Duty (EOD) to support the program.
Bachelor's degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics.
4+ years of supervising and/or managing teams
5+ years of intrusion detection and/or incident handling experience
CISSP and SANS GCIH or GCIA required upon start
Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation
Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations;
Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
Strong analytical and troubleshooting skills.
MUST HAVE ONE OF THE FOLLOWING CERTIFICATIONS:
CCFP - Certified Cyber Forensics Professional
CCNA Security
CCNP Security
CEH - Certified Ethical Hacker
CHFI - Computer Hacking Forensic Investigator
CISSP - Certified Information Systems Security
CIRC
ECES - EC-Council Certified Encryption Specialist
ECIH - EC-Council Certified Incident Handler
ECSA - EC-Council Certified Security Analyst
ECSS - EC-Council Certified Security Specialist
EnCE
ENSA - EC-Council Network Security Administrator
FIWE
GCFA - Forensic Analyst
GCFE - Forensic Examiner
GCIH - Incident Handler
GISF - Security Fundamentals
GNFA - Network Forensic Analyst
GREM - Reverse Engineering Malware
GWEB - Web Application Defender
GXPN - Exploit Researcher and Advanced Penetration Tester
LPT - Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSEE (Exploitation Expert)
OSWP (Wireless Professional)
WFE-E-CI
FTK-WFE-FTK
CompTIA Cyber Security Analyst (CySA+)
CompTIA Linux Network Professional (CLNP)
CompTIA PenTest+
GCTI - Cyber Threat Intelligence
GOSI - Open Source Intelligence
CTIA - Certified Threat Intelligence Analyst
Splunk Core Certified Advanced Power User
Splunk Core Certified Consultant
Splunk SOAR Certified Automation Developer
IACRB Certified Security Awareness Practitioner (CSAP)
PREFERRED QUALIFICATIONS:
Active TS/SCI
Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
LOCATION:
On customer site in Ashburn, VA.
Must be willing and able to commute to Ashburn, VA
CLEARANCE REQUIREMENT:
US Citizen and possess an active DOD Top Secret Clearance.
Selected applicant will be required to undergo background investigation and finger printing by the federal agency and must meet the eligibility requirements.
CRITICAL SOLUTIONS PAY AND BENEFITS:
Salary range $80,000 - $103,000. The salary range for this position represents the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more.
#J-18808-Ljbffr