Logo
National Guard Employment Network

Incident Response Analyst - Swing or Night Shift (Tier 1) - Washington

National Guard Employment Network, Washington, District of Columbia, us, 20022


Job Description

ATTENTION MILITARY AFFILIATED JOB SEEKERS - Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans, Transitioning Military, National Guard and Reserve Members, Military Spouses, Wounded Warriors, and their Caregivers. If you have the required skill set, education requirements, and experience, please click the submit button and follow the next steps.

Here at MindPoint Group, we believe our Security Operations Center (SOC) analysts form the backbone of our cybersecurity services. You will play a critical role in securing our customers by monitoring our tools, triaging alerts, and investigating potential cyber threats. As a SOC team member, you will also serve as the initial point of contact for cybersecurity incidents, ensuring prompt and effective responses.

MindPoint Group is dedicated to your growth. One of the most critical tasks for our Tier 1 SOC Analysts is learning. We provide a supportive environment for you to learn from senior SOC team members, cross-train for other positions, and attend external training. We want to see you grow and improve your cybersecurity skills with us here at MindPoint Group. Join us and delve into the complexities of monitoring enterprise networks, learn basic incident response techniques, and how to effectively investigate phishing threats against our clients.

Responsibilities:

Utilize the SOCs security tools to analyze, investigate, and triage security alerts Perform initial incident response to cybersecurity incidents The ability to ask for help when encountering advanced alerts and escalating them to the senior analysts as needed Route incoming requests to appropriate senior analysts and contract leadership in accordance with SOC SOPs Collaborate with cyber threat hunting and cyber threat intelligence teams Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System (IMS) Learn new open and closed-source investigative techniques Perform research into emerging threats and vulnerabilities to aid in their prevention and mitigation Help shape the evolution of processes and procedures of the SOC

Certificates/Security Clearances/Other

Clearance :

TS/SCI Required Desired:

Any SOC analyst relevant certifications, such as those from GIAC or CompTIA

Additional Qualifications/Responsibilities

Required:

Minimum of one (1) year of relevant experience in a job function with similar responsibilities to this role Understanding of basic network architectures and protocols Knowledge of general attacker techniques Experience in some of the following tools and technologies :i.e. SIEM experience required with Sumo Logic/Splunk preferred. Knowledge of common attacker tools, techniques and procedures (TTP) Experience with major cloud service provider offerings Knowledge of malware Knowledge of enterprise architecture including zero trust principles Knowledge of Windows and Unix operating systems Knowledge of common phishing techniques and how to investigate them Proficiency in technical writing Able to accurately and succinctly convey information through speaking, email, and presentations Comfortable in customer-facing environments Ability to maintain a positive customer service mentality Desired:

Prior SOC or incident response experience, even if it was not your job title Proficiency in technical writing Experience in customer service or client-facing roles Experience presenting and speaking to leadership Any SOC analyst relevant certifications, such as those from GIAC or CompTIA The initiative to ask for assistance and offer fresh ideas to improve the SOC-s performance Shift :

2 Shifts Available: Swings (Wed-Sat 1200-2200) or Nights (Wed-Sat 2100-0700) Clearance :

TS/SCI Required Location:

This hybrid role is expected to be on the client site at least 2 days per week.