Jobs
Benefits & Perks
•Healthcare
•401(k)
•Paid Time Off
•Parental Leave
•Flexible Hours
•Healthcare
•401k
•Parental Leave
•Flexible Hours
Required Skills
Cyber Incident Response
Cybersecurity Operations
Security Incident Response
Malware Analysis
Digital Forensics
Memory Analysis
Type of Requisition:
Regular
Clearance Level Must Currently Possess:
Top Secret SCI + Polygraph
Clearance Level Must Be Able to Obtain:
Top Secret SCI + Polygraph
Public Trust/Other Required:
None
Job Family:
Cyber and IT Risk Management:
Job Qualifications:
Skills:
Cyber Incident Response, Cybersecurity Operations, Security Incident Response
Certifications:
None
Experience:
8 + years of related experience
US Citizenship Required:
Yes
Job Description:
Candidate will provide Expert CSOC Tier 3 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 3 services include malware and implant analysis, and forensic artifact handling and analysis. All Contractor personnel performing CSOC Tier 3 services shall have or obtain, within six months of start, a certificate that is compliant with DoDD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Incident Responder.
Job Duties:
·Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government.
· Coordinates with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents.
·Collaborates with appropriate authorities in the production of security incident reports.
·Categorizes incidents and events.
·Coordinates with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated.
·Coordinates with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/events.
and analyze data and respond to incidents/events.
·Performs digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis.
·Develops and identifies indicators of compromise to send to Cybersecurity stakeholders and other Contract Services.
· Performs malware analysis and signature development.
· Coordinate with CSOC Tier 1 and 2 services to remediate all discrepancies and provide recommendations to prevent recurrence.
Job Requirements:
