Booz Allen Hamilton
Cloud Cyber Incident Response Analyst, Lead
Booz Allen Hamilton, Los Angeles, California, United States, 90079
Cloud Cyber Incident Response Analyst, Lead
Locations:
McLean, VA; Los Angeles, CA; Denver, CO; New York City, NY; Chicago, IL Time Type:
Full Time Posted On:
Posted Yesterday End Date:
February 15, 2025 (30+ days left to apply) Job Requisition ID:
R Key Role: Responds to and resolves cyber security incidents, participates in cyber incident response investigations requiring forensic, malware, and log analysis, and analyzes forensic images and triage datasets to identify indicators of compromise, lateral movement, and unauthorized access or exfiltration of data. Applies leading–edge principles, theories, and concepts, and contributes to the development of new principles and concepts. Works on unusually complex problems and provides highly innovative solutions. Operates with substantial latitude for unreviewed actions or decisions, and mentors or supervises employees in both firm and technical competencies. Due to the nature of work performed within this facility, U.S. citizenship is required. Basic Qualifications: Experience with investigating incidents in cloud platforms, including AWS, Azure, or GCP. Experience with analyzing Microsoft Windows and non–Windows systems, including Mac or Linux and using DFIR toolsets, including FTK, EnCase, XWF, or Axiom. Experience with analyzing logs, including firewall, network traffic, web server, Antivirus, and DNS. Experience with scripted DFIR toolsets written in Python or PowerShell, and in leading a DFIR team, including assisting junior team members with their case load. Knowledge of common forensic artifacts analyzed during incidents to determine attack vector, lateral movement, and data exfiltration and the platform–native tools and data available for investigation. Ability to correlate events from multiple sources to create a timeline analysis. Ability to organize case notes and communicate verbally and in writing to clients. Ability to prepare detailed technical reports. Ability to work after standard business hours, including some evenings and some weekends, take a rotation on call, and work more than one incident at a time. Bachelor's degree. Additional Qualifications: Ability to prioritize work assignments without guidance. Ability to mentor junior team members. Ability to develop scripts or utilize log and data analysis platforms including Elastic, Splunk, or AWS Athena to quickly analyze large network and application log datasets. GIAC Cloud Forensics Responder (GCFR), GIAC Cloud Threat Detection (GCTD), GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified Network Intrusion Analyst certifications. Compensation: The projected compensation range for this position is $110,100.00 to $250,000.00 (annualized USD). Work Model: Our people–first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role. EEO Commitment: We're an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr
McLean, VA; Los Angeles, CA; Denver, CO; New York City, NY; Chicago, IL Time Type:
Full Time Posted On:
Posted Yesterday End Date:
February 15, 2025 (30+ days left to apply) Job Requisition ID:
R Key Role: Responds to and resolves cyber security incidents, participates in cyber incident response investigations requiring forensic, malware, and log analysis, and analyzes forensic images and triage datasets to identify indicators of compromise, lateral movement, and unauthorized access or exfiltration of data. Applies leading–edge principles, theories, and concepts, and contributes to the development of new principles and concepts. Works on unusually complex problems and provides highly innovative solutions. Operates with substantial latitude for unreviewed actions or decisions, and mentors or supervises employees in both firm and technical competencies. Due to the nature of work performed within this facility, U.S. citizenship is required. Basic Qualifications: Experience with investigating incidents in cloud platforms, including AWS, Azure, or GCP. Experience with analyzing Microsoft Windows and non–Windows systems, including Mac or Linux and using DFIR toolsets, including FTK, EnCase, XWF, or Axiom. Experience with analyzing logs, including firewall, network traffic, web server, Antivirus, and DNS. Experience with scripted DFIR toolsets written in Python or PowerShell, and in leading a DFIR team, including assisting junior team members with their case load. Knowledge of common forensic artifacts analyzed during incidents to determine attack vector, lateral movement, and data exfiltration and the platform–native tools and data available for investigation. Ability to correlate events from multiple sources to create a timeline analysis. Ability to organize case notes and communicate verbally and in writing to clients. Ability to prepare detailed technical reports. Ability to work after standard business hours, including some evenings and some weekends, take a rotation on call, and work more than one incident at a time. Bachelor's degree. Additional Qualifications: Ability to prioritize work assignments without guidance. Ability to mentor junior team members. Ability to develop scripts or utilize log and data analysis platforms including Elastic, Splunk, or AWS Athena to quickly analyze large network and application log datasets. GIAC Cloud Forensics Responder (GCFR), GIAC Cloud Threat Detection (GCTD), GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified Network Intrusion Analyst certifications. Compensation: The projected compensation range for this position is $110,100.00 to $250,000.00 (annualized USD). Work Model: Our people–first culture prioritizes the benefits of flexibility and collaboration, whether that happens in person or remotely. If this position is listed as remote or hybrid, you'll periodically work from a Booz Allen or client site facility. If this position is listed as onsite, you'll work with colleagues and clients in person, as needed for the specific role. EEO Commitment: We're an equal employment opportunity/affirmative action employer that empowers our people to fearlessly drive change – no matter their race, color, ethnicity, religion, sex (including pregnancy, childbirth, lactation, or related medical conditions), national origin, ancestry, age, marital status, sexual orientation, gender identity and expression, disability, veteran status, military or uniformed service member status, genetic information, or any other status protected by applicable federal, state, local, or international law.
#J-18808-Ljbffr