Please note that this is a 9 month contract position.
Description: Respond to Cyber Security Incidents, provide cyber threat analysis and reporting to support SOC and Program’s situational awareness. Note: Resource must be available to work onsite at the facility in Washington, DC area. Required Skills: • Will actively monitor security threats and risks, provide in-depth incident analysis, evaluate security incidents, and will provide proactive threat research. • Monitor network traffic for security events and perform triage analysis to identify security incidents. • Respond to computer security incidents by collecting, analyzing, preserving digital evidence and ensure that incidents are recorded and tracked in accordance with SOC requirements. • Work closely with the other teams to assess risk and provide recommendations for improving our security posture. • The ability to take lead on incident research when appropriate and be able to mentor junior analysts. • Experience managing cases with enterprise SIEM systems like Arcsight, Splunk or Sourcefire.
EXPERIENCE LEVEL: • 3-5 years of related experience on a Computer Incident Response Team (CIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIRC) or a Security Operations Center (SOC). EDUCATION: • Bachelor’s Degree in Computer Science, Information Technology or Information Security preferred or a technically related field OR equivalent related work experience CERTIFICATIONS: (One or more desired) • CompTIA Security + • CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker • GCIH - (GIAC Certified Incident Handler) or ECIH - (EC-Council Certified Incident Handler) • CISA - Certified Information Systems Auditor
Please reference job number number 2098.
San Francisco, CAContact