Gray Tier Technologies
Incident Response Analyst Tier 2 (Hybrid)
Gray Tier Technologies, Ashburn, Virginia, United States, 22011
Gray Tier technologies is seeking an experienced Incident Response Analyst to support this highly visible cyber security operations center (SOC) for Customs Border Protection (CBP), cyber analysis, application development, and a 24x7x365 support staff.
Primary Responsibilities:
Shift schedule: 7am-7pm, Thurs-Sat, every other Wednesday.The ideal candidate will have a basic understanding of cyber threats, information security, and monitoring and detection. The candidate must be familiar with TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.- Security+ Certification or equivalent in industry certification, background and knowledge.- Knowledge of TCP/UDP/IP networking, familiarity with packet analysis tools such as WireShark, and a general understanding of networking protocols similar to COMPTIA Network+
Basic Qualifications: .
Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.
Additional certs may be considered in place of a degree.
Clearance:
A Secret Clearance is required with the ability to obtain a Top Secret SCI. In addition to specific security clearance requirements all CBP SOC employees are required to successfully complete a CBP Background Investigation to support this program
Preferred Qualifications:
Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC roleCyber Kill Chain KnowledgeAbility to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell
One of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISO
#J-18808-Ljbffr
Primary Responsibilities:
Shift schedule: 7am-7pm, Thurs-Sat, every other Wednesday.The ideal candidate will have a basic understanding of cyber threats, information security, and monitoring and detection. The candidate must be familiar with TCP/IP ports and protocols, intrusion detection systems, and netflow analysis.- Security+ Certification or equivalent in industry certification, background and knowledge.- Knowledge of TCP/UDP/IP networking, familiarity with packet analysis tools such as WireShark, and a general understanding of networking protocols similar to COMPTIA Network+
Basic Qualifications: .
Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.
Additional certs may be considered in place of a degree.
Clearance:
A Secret Clearance is required with the ability to obtain a Top Secret SCI. In addition to specific security clearance requirements all CBP SOC employees are required to successfully complete a CBP Background Investigation to support this program
Preferred Qualifications:
Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC roleCyber Kill Chain KnowledgeAbility to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell
One of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISO
#J-18808-Ljbffr