Join to apply for the Senior Cyber Incident Responder role at LTS
4 days ago Be among the first 25 applicants
Join to apply for the Senior Cyber Incident Responder role at LTS
Get AI-powered advice on this job and more exclusive features.
LTS is seeking an experienced Senior Cyber Incident Responder to lead and coordinate advanced cyber defense incident response operations across enterprise systems. This role is responsible for forensic evidence collection, threat detection, incident resolution, trend analysis, and threat reporting. The ideal candidate will have deep technical knowledge in intrusion analysis and remediation, with the ability to support teams' enterprise-wide and translate threat data into actionable guidance. This position plays a key role in strengthening cyber resilience by rapidly addressing and mitigating threats. This position is on-site in Washington D.C. The position is contingent on the award.
LTS provides trusted consulting, and solutions in an increasingly complex and growing world. Our deep expertise in technology and analytics helps us serve a broad constituency of clients that range from cabinet-level departments of the U.S. Government to the largest Federal IT contractors in the world.
LTS is a leading information technology (IT) provider for mission critical systems leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in multiple disciplines including program management, system integration, system design, system development, cybersecurity, infrastructure and data analytics.
Responsibilities
- Coordinate and lead enterprise-wide incident response functions in support of cyber defense operations.
- Provide expert technical support to cyber defense teams during active incidents.
- Perform initial forensic evidence collection, including image acquisition and analysis to guide remediation decisions.
- Collect and analyze intrusion artifacts (e.g., malware, source code, Trojans) to support mitigation efforts.
- Receive, analyze, and investigate network alerts from a variety of internal sources and tools
- Identify root causes of alerts and determine the appropriate containment, eradication, and recovery actions.
- Monitor external threat sources (e.g., CERTs, vendor sites, open-source threat feeds) to maintain awareness of evolving cyber threats.
- Conduct cyber defense trend analysis and develop threat activity reports for leadership and stakeholders.
- Write and publish after-action reviews (AARs) following significant cyber incidents.
- Document and distribute cyber defense techniques, procedures, and guidance to internal teams based on incident findings.
- Correlate alert and incident data to proactively identify patterns and vulnerabilities within enterprise systems.
- Support the development and refinement of incident response procedures, SOPs, and knowledge bases.
- Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, Engineering, or a related field is required.
- A minimum of 7 years of experience in n incident response, cyber defense operations, or digital forensics.
- TS/SCI Security Clearance.
- Certified Information Systems Security Professional (CISSP), GCIH – GIAC Certified Incident Handler, GCFA – GIAC Certified Forensic Analyst, CHFI – Computer Hacking Forensic Investigator, CEH – Certified Ethical Hacker, Security+ or CySA+ are required.
- Proficiency in forensic tools and techniques for data acquisition, malware analysis, and evidence handling.
- Strong working knowledge of SIEM tools, IDS/IPS, network traffic analysis, and endpoint protection platforms.
- Demonstrated ability to lead incident response efforts and coordinate across teams in high-pressure environments.
- Familiarity with cyber threat intelligence sources, malware indicators, and intrusion techniques.
- Excellent writing and communication skills for producing after-action reports, advisories, and technical guidance.
- Solid understanding of cybersecurity frameworks including NIST 800-61, MITRE ATT&CK, and defense-in-depth principles.
- Deep familiarity with federal cybersecurity regulations, including FISMA, FedRAMP, and DOC/OMB security guidelines.
- Excellent written and verbal communication skills, including the ability to brief technical content to non-technical audiences.
Seniority level
Seniority level
Mid-Senior level
Employment type
Employment type
Full-time
Job function
Job function
Information TechnologyIndustries
IT Services and IT Consulting
Referrals increase your chances of interviewing at LTS by 2x
Get notified about new Cyber Security Analyst jobs in Washington, DC .
Washington, DC $110,000.00-$125,000.00 1 week ago
Cybersecurity Engineer/Analyst (Junior Level | 1-2 years exp.)
Washington, DC $120.00-$125.00 1 month ago
Cybersecurity Engineer/Analyst (Junior Level | 1-2 years exp.)- Fairfax County
Security Operations Center (SOC) Analyst
2026674 Cyber Security Analyst $175,000.00
McLean, VA $10,000.00-$175,000.00 1 day ago
Information Assurance/ Security Specialist
Washington, DC $110,000.00-$125,000.00 1 week ago
Information Security Analyst (SOC 2 Compliance)
Fairfax, VA $92,400.00-$115,000.00 1 month ago
FBI Special Agent: Cybersecurity/IT Expertise
Arlington, VA $99,461.00-$128,329.00 1 day ago
Washington, DC $122,000.00-$183,000.00 2 weeks ago
Security Operations Center (SoC) Analyst
Sterling, VA $70,000.00-$85,000.00 2 weeks ago
Cybersecurity SME Level 1,2,3 in Greater DC Metro Area
Washington, DC $103,000.00-$154,000.00 2 days ago
Chantilly, VA $10,000.00-$180,000.00 1 day ago
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr