Critical Solutions
T2 Cyber Incident Response Analyst - (w/ active TS)
Critical Solutions, Washington, District of Columbia, us, 20022
Cyber Incident Response Analyst - (w/ active TS)
Location: Washington, DC
Work type: Full-time, Onsite
Clearance Required: Top Secret w/ SCI eligibility
Schedule: Saturday 12 hours, on site), Sunday (12 hours, on site), plus two 8-hour shift on weekdays
JOB DESCRIPTION
Critical Solutions is seeking a Tier 2 Cyber Incident Response Analyst to support threat monitoring, detection, event analysis, and incident reporting. The Security Operations Center is a 24/7 environment. You will be responsible for monitoring enterprise networks and systems, detecting events, and reporting on any and all threats that are directed against those systems regardless of their classification level or type.
Typically, the client's sensor grid acquires millions of events per day and events are analyzed and categorized in accordance with the Cyber Security Incident Response Plan. The Incident Response Analyst will provide the client with a fully comprehensive array of analytical activities in support of external threat monitoring, detection, event analysis, and incident reporting efforts including presentation reviews, internal and external threat reporting, analysis of inbound and outbound public internet traffic, suspicious e-mail messages, administering access request to specific public sites, communicating and coordinating the characterization of events and the response.
PRIMARY ROLES AND RESPONSIBILITIES:Provides support for complex computer network exploitation and defense techniques to include deterring, identifying, and investigating computer and network intrusions; providing incident response and remediation support;Performing comprehensive computer surveillance/monitoring, identifying vulnerabilities; developing secure network designs and protection strategies, and audits of information security infrastructure.Provides technical support for continuous monitoring, computer exploitation and reconnaissance; target mapping and profiling; and, network decoy and deception operations in support of computer intrusion defense operations.Provides technical support for forensics services to include evidence seizure, computer forensic analysis, and data recovery, in support of computer crime investigation.Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures, and trends.Performs research into emerging threat sources and develops threat profiles.Provides technical support for a comprehensive risk management program identifying mission-critical processes and systems; current and projected threats; and system vulnerabilities.BASIC QUALIFICATIONS:
Active Top Secret with SCI eligibility required*Must be able to commute onsite on weekends and support shift scheduleMinimum of four (4) years of general work experience and three (3) years of relevant experience in functional responsibilityBachelor's Degree, or an equivalent combination of formal education, experienceExperience in the following tools and technologies:
BRO IDSSplunk SIEMRSA NetwitnessFireEyeSourcefire (Snort)CrowdStrike EDRFidelis XPS
Strong analytical and organizational skillsStrong verbal and written communication skillsExperience with MS Word and other MS Office ApplicationsPREFERRED QUALIFICATIONS:
Experience working a SOC and doing incident responseExperience with securing various environments preferredExperience and education preferred in eCPPT, OSCP, GCFW, GCIH, other relevant IT security certifications, or advanced vendor certifications such as Splunk Certified Architect or SourceFire Certified Administrator; Security+, GSEC, or other relevant IT security product certifications such as Tenable Certified Nessus Auditor, or SnortCP; CISSP, CISM, or ISO 27001SCHEDULE:
10PM FRI - 10AM SAT (on site), 10PM SAT - 10AM SUN (on site), plus two 8-hour shift on during the week.LOCATION:
This is a hybrid role with expectations of being on the client site most days, including weekendMust be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT:
Must possess an active DoD Top Secret Clearance . In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS :
Salary range $75,000 - $95,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more.
Location: Washington, DC
Work type: Full-time, Onsite
Clearance Required: Top Secret w/ SCI eligibility
Schedule: Saturday 12 hours, on site), Sunday (12 hours, on site), plus two 8-hour shift on weekdays
JOB DESCRIPTION
Critical Solutions is seeking a Tier 2 Cyber Incident Response Analyst to support threat monitoring, detection, event analysis, and incident reporting. The Security Operations Center is a 24/7 environment. You will be responsible for monitoring enterprise networks and systems, detecting events, and reporting on any and all threats that are directed against those systems regardless of their classification level or type.
Typically, the client's sensor grid acquires millions of events per day and events are analyzed and categorized in accordance with the Cyber Security Incident Response Plan. The Incident Response Analyst will provide the client with a fully comprehensive array of analytical activities in support of external threat monitoring, detection, event analysis, and incident reporting efforts including presentation reviews, internal and external threat reporting, analysis of inbound and outbound public internet traffic, suspicious e-mail messages, administering access request to specific public sites, communicating and coordinating the characterization of events and the response.
PRIMARY ROLES AND RESPONSIBILITIES:Provides support for complex computer network exploitation and defense techniques to include deterring, identifying, and investigating computer and network intrusions; providing incident response and remediation support;Performing comprehensive computer surveillance/monitoring, identifying vulnerabilities; developing secure network designs and protection strategies, and audits of information security infrastructure.Provides technical support for continuous monitoring, computer exploitation and reconnaissance; target mapping and profiling; and, network decoy and deception operations in support of computer intrusion defense operations.Provides technical support for forensics services to include evidence seizure, computer forensic analysis, and data recovery, in support of computer crime investigation.Researches and maintains proficiency in open and closed source computer exploitation tools, attack techniques, procedures, and trends.Performs research into emerging threat sources and develops threat profiles.Provides technical support for a comprehensive risk management program identifying mission-critical processes and systems; current and projected threats; and system vulnerabilities.BASIC QUALIFICATIONS:
Active Top Secret with SCI eligibility required*Must be able to commute onsite on weekends and support shift scheduleMinimum of four (4) years of general work experience and three (3) years of relevant experience in functional responsibilityBachelor's Degree, or an equivalent combination of formal education, experienceExperience in the following tools and technologies:
BRO IDSSplunk SIEMRSA NetwitnessFireEyeSourcefire (Snort)CrowdStrike EDRFidelis XPS
Strong analytical and organizational skillsStrong verbal and written communication skillsExperience with MS Word and other MS Office ApplicationsPREFERRED QUALIFICATIONS:
Experience working a SOC and doing incident responseExperience with securing various environments preferredExperience and education preferred in eCPPT, OSCP, GCFW, GCIH, other relevant IT security certifications, or advanced vendor certifications such as Splunk Certified Architect or SourceFire Certified Administrator; Security+, GSEC, or other relevant IT security product certifications such as Tenable Certified Nessus Auditor, or SnortCP; CISSP, CISM, or ISO 27001SCHEDULE:
10PM FRI - 10AM SAT (on site), 10PM SAT - 10AM SUN (on site), plus two 8-hour shift on during the week.LOCATION:
This is a hybrid role with expectations of being on the client site most days, including weekendMust be willing and able to commute to Washington, DC
ADDITIONAL INFORMATION:
CLEARANCE REQUIREMENT:
Must possess an active DoD Top Secret Clearance . In addition, selected candidate must undergo background investigation (BI) and finger printing by the federal agency and successfully pass the preceding to qualify for the position. US CITIZENSHIP IS REQUIRED
CRITICAL SOLUTIONS PAY AND BENEFITS :
Salary range $75,000 - $95,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more.