VetJobs
Incident Response Analyst - Shift 2 4x10 (Tier 2) - Washington DC
VetJobs, Washington, District of Columbia, us, 20022
Job Description
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps.
MindPoint Group is searching for a Incident Response Analyst to support weekend shift activities. We believe our Security Operations Center (SOC) analysts form the backbone of our cybersecurity services. Take your career to the next level and join us as a Tier 2 SOC Analyst. You will play a critical role in conducting in-depth analyses and responding to incidents of potential cyber threats facing our clients. In addition to being our initial point of contact for end users, you will serve as the escalation point for junior analysts, helping guide them through more complex and high-priority incidents.
MindPoint Group is dedicated to your growth. One of the most critical tasks for our Tier 2 SOC Analysts is learning. We provide a supportive environment for you to learn from senior SOC team members, cross-train with other positions, and attend external training.
As part of our team at MindPoint Group, you will delve further into the intricacies of enterprise network security, hone your incident response techniques, and develop a deep understanding of identifying and mitigating increasingly sophisticated threats. Join us at MindPoint Group and take the next step in your cybersecurity career.
Responsibilities:
Utilize security tools to analyze, investigate, and triage security alertsMonitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activityPerform in-depth analysis and investigation of high-priority cybersecurity incidentsUtilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes, scope, and impactCollaborate with cyber threat hunting and cyber threat intelligence teamsParticipate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)Learn new open and closed-source investigative techniquesPerform research into emerging threats and vulnerabilities to aid their prevention and mitigationHelp shape the evolution of processes and procedures of the SOCProvide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Certificates/Security Clearances/Other
Required:
CISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretionDesired:
Any SOC analyst relevant certifications such as those from GIAC or CompTIA
Additional Qualifications/Responsibilities
Required:
Minimum of six (6) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR roleBachelor-s Degree or higher in Cybersecurity or related is preferredCISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretionExperience in some of the following tools and technologies: i.e. SIEM experience required with Sumo Logic/Splunk preferred.Knowledge of common attacker tools, techniques and procedures (TTP)Experience with major cloud service provider offeringsKnowledge of malwareKnowledge of enterprise architecture including zero trust principlesKnowledge of Windows and Unix operating systemsKnowledge of common phishing techniques and how to investigate themProficiency in technical writingAble to accurately and succinctly convey information through speaking, email, and presentationsComfortable in customer facing environmentsAbility to maintain a positive customer service mentalityDesired:
Previous SOC or incident response experienceWorking knowledge of regex and scripting languagesAny SOC analyst relevant certifications such as those from GIAC or CompTIAThe initiative to ask for assistance and offer fresh ideas to improve the SOC-s performanceShift:
Tier 2 weekdays (M-F), 2nd shift (currently 2 pm-10 pm). Minimum 2 days on-site at DOJ.Clearance:
Applicable US Government Clearance requiredLocation:
This hybrid role is expected to be on the client site at least 2 days per week.
ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps.
MindPoint Group is searching for a Incident Response Analyst to support weekend shift activities. We believe our Security Operations Center (SOC) analysts form the backbone of our cybersecurity services. Take your career to the next level and join us as a Tier 2 SOC Analyst. You will play a critical role in conducting in-depth analyses and responding to incidents of potential cyber threats facing our clients. In addition to being our initial point of contact for end users, you will serve as the escalation point for junior analysts, helping guide them through more complex and high-priority incidents.
MindPoint Group is dedicated to your growth. One of the most critical tasks for our Tier 2 SOC Analysts is learning. We provide a supportive environment for you to learn from senior SOC team members, cross-train with other positions, and attend external training.
As part of our team at MindPoint Group, you will delve further into the intricacies of enterprise network security, hone your incident response techniques, and develop a deep understanding of identifying and mitigating increasingly sophisticated threats. Join us at MindPoint Group and take the next step in your cybersecurity career.
Responsibilities:
Utilize security tools to analyze, investigate, and triage security alertsMonitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activityPerform in-depth analysis and investigation of high-priority cybersecurity incidentsUtilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents- root causes, scope, and impactCollaborate with cyber threat hunting and cyber threat intelligence teamsParticipate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)Learn new open and closed-source investigative techniquesPerform research into emerging threats and vulnerabilities to aid their prevention and mitigationHelp shape the evolution of processes and procedures of the SOCProvide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Certificates/Security Clearances/Other
Required:
CISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretionDesired:
Any SOC analyst relevant certifications such as those from GIAC or CompTIA
Additional Qualifications/Responsibilities
Required:
Minimum of six (6) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR roleBachelor-s Degree or higher in Cybersecurity or related is preferredCISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretionExperience in some of the following tools and technologies: i.e. SIEM experience required with Sumo Logic/Splunk preferred.Knowledge of common attacker tools, techniques and procedures (TTP)Experience with major cloud service provider offeringsKnowledge of malwareKnowledge of enterprise architecture including zero trust principlesKnowledge of Windows and Unix operating systemsKnowledge of common phishing techniques and how to investigate themProficiency in technical writingAble to accurately and succinctly convey information through speaking, email, and presentationsComfortable in customer facing environmentsAbility to maintain a positive customer service mentalityDesired:
Previous SOC or incident response experienceWorking knowledge of regex and scripting languagesAny SOC analyst relevant certifications such as those from GIAC or CompTIAThe initiative to ask for assistance and offer fresh ideas to improve the SOC-s performanceShift:
Tier 2 weekdays (M-F), 2nd shift (currently 2 pm-10 pm). Minimum 2 days on-site at DOJ.Clearance:
Applicable US Government Clearance requiredLocation:
This hybrid role is expected to be on the client site at least 2 days per week.