Tyto Athene, LLC
Part-Time Incident Response Analyst - Tier 2
Tyto Athene, LLC, Washington, District of Columbia, us, 20022
Overview
Part-Time Incident Response Analyst - Tier 2 at Tyto Athene, LLC. This role supports the customer's Security Operations Center (SOC) with in-depth analyses and incident response to potential cyber threats. You will be the initial point of contact for end users and the escalation point for junior analysts on more complex incidents. Base pay range $40.00/hr - $50.00/hr Location: Washington, DC area (on client site) and related notes per posting. Responsibilities
Utilize security tools to analyze, investigate, and triage security alerts Monitor customer environments, including cloud and SaaS solutions, for evidence of adversarial activity Perform in-depth analysis and investigation of high-priority cybersecurity incidents Use advanced tools (host-based forensics, malware analysis) to identify root causes, scope, and impact Collaborate with cyber threat hunting and cyber threat intelligence teams Develop, implement, and tune SOC tool detection content and alerting signatures Document triage findings and intake reports of external cybersecurity events in the SOC’s Incident Management System (IMS) Learn new investigative techniques and research emerging threats to aid prevention and mitigation Help shape and improve SOC processes and procedures Provide guidance and mentorship to Tier 1 SOC Analysts Qualifications
Minimum four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or incident response role Bachelor’s Degree or higher in Cybersecurity or related field preferred Experience with SIEM tools (e.g., Sumo Logic, Splunk); knowledge of attacker tools, techniques, and procedures (TTP) Experience with major cloud service provider offerings Knowledge of malware and enterprise architecture including zero trust principles Knowledge of Windows and Unix operating systems Knowledge of common phishing techniques and investigation methods Proficiency in technical writing and clear verbal/email communication; comfortable in customer-facing environments Ability to maintain a positive customer service mentality Previous SOC or incident response experience; working knowledge of regex and scripting languages Relevant certifications (e.g., GIAC, CompTIA, CISSP, CEH) or equivalents; client discretion may substitute qualifications Ability to ask for help when needed and offer ideas to improve SOC performance Clearance
TS/SCI Location
On client site in Washington, DC Senioriy level
Mid-Senior level Employment type
Part-time Job function
Information Technology Industries
IT Services and IT Consulting Computer and Network Security Additional notes: Referrals may increase interviewing chances. The posting may include related compensation insights for similar roles in nearby locations.
#J-18808-Ljbffr
Part-Time Incident Response Analyst - Tier 2 at Tyto Athene, LLC. This role supports the customer's Security Operations Center (SOC) with in-depth analyses and incident response to potential cyber threats. You will be the initial point of contact for end users and the escalation point for junior analysts on more complex incidents. Base pay range $40.00/hr - $50.00/hr Location: Washington, DC area (on client site) and related notes per posting. Responsibilities
Utilize security tools to analyze, investigate, and triage security alerts Monitor customer environments, including cloud and SaaS solutions, for evidence of adversarial activity Perform in-depth analysis and investigation of high-priority cybersecurity incidents Use advanced tools (host-based forensics, malware analysis) to identify root causes, scope, and impact Collaborate with cyber threat hunting and cyber threat intelligence teams Develop, implement, and tune SOC tool detection content and alerting signatures Document triage findings and intake reports of external cybersecurity events in the SOC’s Incident Management System (IMS) Learn new investigative techniques and research emerging threats to aid prevention and mitigation Help shape and improve SOC processes and procedures Provide guidance and mentorship to Tier 1 SOC Analysts Qualifications
Minimum four (4) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or incident response role Bachelor’s Degree or higher in Cybersecurity or related field preferred Experience with SIEM tools (e.g., Sumo Logic, Splunk); knowledge of attacker tools, techniques, and procedures (TTP) Experience with major cloud service provider offerings Knowledge of malware and enterprise architecture including zero trust principles Knowledge of Windows and Unix operating systems Knowledge of common phishing techniques and investigation methods Proficiency in technical writing and clear verbal/email communication; comfortable in customer-facing environments Ability to maintain a positive customer service mentality Previous SOC or incident response experience; working knowledge of regex and scripting languages Relevant certifications (e.g., GIAC, CompTIA, CISSP, CEH) or equivalents; client discretion may substitute qualifications Ability to ask for help when needed and offer ideas to improve SOC performance Clearance
TS/SCI Location
On client site in Washington, DC Senioriy level
Mid-Senior level Employment type
Part-time Job function
Information Technology Industries
IT Services and IT Consulting Computer and Network Security Additional notes: Referrals may increase interviewing chances. The posting may include related compensation insights for similar roles in nearby locations.
#J-18808-Ljbffr