Senior Incident Response Analyst

Automation, Best practices, CISSP, COM, Certified Ethical Hacker, Cloud, Communication skills, Computer, Computer science, Computer-aided software engineering, Cyber security, DHCP, DNS, DoD, EOD, Education, Email, Engineering, Enterprise networks, Firewall, Forensics, Framework, GCIA, GCIH, GIAC, HTTP, IT, Implementation, Incident management, Intrusion detection, Knowledge management, Leadership, Linux, Load balancing, Malware analysis, Mentorship, Microsoft Windows, Monitoring, Operating systems, Operations, Planning, Proxies, QA, ROOT, Reporting, Research, Routing, SANS, Security, Security clearance, Security operations, Supervision, Switches, System on a chip, Team management, Troubleshooting, VPN
Contract W2, Contract Corp-To-Corp
Depends on Experience
Travel not required

Job Description

Our Ashburn VA based client is looking for multiple Senior Incident Response Analyst. If you are qualified for this position, please email your updated resume in word format to




518/Senior Incident Response Analyst


Required Education/Experience

A bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics.


Primary Responsibilities

  • In-depth knowledge of each phase of the Incident Response life cycle
  • Expertise of Operating Systems (Windows/Linux) operations and artifacts
  • Understanding of Enterprise Network Architectures to include routing/switching, common protocols (DHCP, DNS, HTTP, etc), and devices (Firewalls, Proxies, Load Balancers, VPN, etc)
  • Ability to recognize suspicious activity/events, common attacker TTPs, perform logical analysis and research to determine root cause and scope of Incidents
  • Drive implementation and improvement of new tools, capabilities, frameworks, and methodologies
  • Instill and reinforce industry best practices in the domains of incident response, cybersecurity analysis, case and knowledge management, and SOC operations
  • Promote and drive implementation of automation and process efficiencies
  • Familiarity with Cyber Kill Chain and ATT&CK Framework and how to leverage in Security Operations
  • Provide guidance and mentorship to improve analyst skill sets and ensure delivery of high-quality analysis and work products
  • Establish trust and business relationships with customer and other relevant stakeholders



Basic Qualifications

  • All Senior Incident Response Analyst candidates shall have a minimum of a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS 4 years of experience in incident detection and response, malware analysis, or cyber forensics.
  • Must have TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program.
  • 4+ years of supervising and/or managing teams
  • 5+ years of intrusion detection and/or incident handling experience
  • CISSP and SANS GCIH or GCIA required upon start
  • Advanced knowledge in planning, directing, and managing Computer Incident Response Team (CIRT) and/or Security Operations Center (SOC) operations for a large and complex Enterprise
  • Significant experience supervising and leading employees of various labor categories and technical skill levels in efforts similar in size and scope to a mature Security Operation
  • Mature understanding of industry accepted standards for incident response actions and best practices related to SOC operations;
  • Strong written and verbal communication skills, and the ability to create technical reports based on analytical findings.
  • Strong analytical and troubleshooting skills.


Preferred Qualifications

  • Deep technical understanding of core current cybersecurity technologies as well as emerging capabilities.
  • Hands-on cybersecurity experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization including prior experience performing large-scale incident response.
  • Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
  • Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
  • Familiarity with Cloud concepts and experience performing monitoring and responding to threats in Cloud environments
  • Must Have One of the Following J3 Certifications
  • CISSP and SANS GCIH or GCIA required upon start



Clearance Level Required: Top Secret/SCI

Travel: No

Scheduled Weekly Hours:40



Desired Certifications:

DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst - DoD 8140.01 GCIA, GCIH, CSSP Analyst/CSSP Incident Responder - DoD 8140.01 CEH, CSSP Analyst - SANS GIAC GNFA preferred


Dice Id : baseone
Position Id : 7181623
Originally Posted : 1 month ago
Have a Job? Post it

Similar Positions

Detection Engineer
  • Base One Technologies
  • Ashburn, VA, USA
Tier 3 Cyber Network Defense Analyst
  • Base One Technologies
  • Ashburn, VA, USA
Cyber Threat Hunter Lead
  • Base One Technologies
  • Washington, DC, USA
Lead Cyber Security Analyst
  • Vega Consulting Solutions
  • Washington, DC, USA
Dev/SecOps Lead
  • Base One Technologies
  • Washington, DC, USA
Threat Intelligence Analyst
  • Sage IT Inc
  • Wilmington, DE, USA
Cyber Incident Response/ Security Operations
  • DTG Consulting Solutions Inc.
  • New York, NY, USA
Cybersecurity Engineer - Senior
  • Electronic Consulting Services, Inc (ECS Federal)
  • Washington, PA, USA
Senior Information Security Analyst
  • DTG Consulting Solutions Inc.
  • New York, NY, USA