Logo
LTS

Senior Cyber Incident Responder

LTS, Washington, District of Columbia, us, 20022

Save Job

Join to apply for the

Senior Cyber Incident Responder

role at

LTS 4 days ago Be among the first 25 applicants Join to apply for the

Senior Cyber Incident Responder

role at

LTS Get AI-powered advice on this job and more exclusive features. LTS

is seeking an experienced

Senior Cyber Incident Responder

to lead and coordinate advanced cyber defense incident response operations across enterprise systems. This role is responsible for forensic evidence collection, threat detection, incident resolution, trend analysis, and threat reporting. The ideal candidate will have deep technical knowledge in intrusion analysis and remediation, with the ability to support teams' enterprise-wide and translate threat data into actionable guidance. This position plays a key role in strengthening cyber resilience by rapidly addressing and mitigating threats.

This position is on-site in Washington D.C.

The position is contingent on the award.

LTS

provides trusted consulting, and solutions in an increasingly complex and growing world. Our deep expertise in technology and analytics helps us serve a broad constituency of clients that range from cabinet-level departments of the U.S. Government to the largest Federal IT contractors in the world.

LTS

is a leading information technology (IT) provider for mission critical systems leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in multiple disciplines including program management, system integration, system design, system development, cybersecurity, infrastructure and data analytics.

Responsibilities

Coordinate and lead enterprise-wide incident response functions in support of cyber defense operations. Provide expert technical support to cyber defense teams during active incidents. Perform initial forensic evidence collection, including image acquisition and analysis to guide remediation decisions. Collect and analyze intrusion artifacts (e.g., malware, source code, Trojans) to support mitigation efforts. Receive, analyze, and investigate network alerts from a variety of internal sources and tools Identify root causes of alerts and determine the appropriate containment, eradication, and recovery actions. Monitor external threat sources (e.g., CERTs, vendor sites, open-source threat feeds) to maintain awareness of evolving cyber threats. Conduct cyber defense trend analysis and develop threat activity reports for leadership and stakeholders. Write and publish after-action reviews (AARs) following significant cyber incidents. Document and distribute cyber defense techniques, procedures, and guidance to internal teams based on incident findings. Correlate alert and incident data to proactively identify patterns and vulnerabilities within enterprise systems. Support the development and refinement of incident response procedures, SOPs, and knowledge bases.

Required Skills, Experience & Qualifications

Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, Engineering, or a related field is required. A minimum of 7 years of experience in n incident response, cyber defense operations, or digital forensics. TS/SCI Security Clearance. Certified Information Systems Security Professional (CISSP), GCIH – GIAC Certified Incident Handler, GCFA – GIAC Certified Forensic Analyst, CHFI – Computer Hacking Forensic Investigator, CEH – Certified Ethical Hacker, Security+ or CySA+ are required. Proficiency in forensic tools and techniques for data acquisition, malware analysis, and evidence handling. Strong working knowledge of SIEM tools, IDS/IPS, network traffic analysis, and endpoint protection platforms. Demonstrated ability to lead incident response efforts and coordinate across teams in high-pressure environments. Familiarity with cyber threat intelligence sources, malware indicators, and intrusion techniques. Excellent writing and communication skills for producing after-action reports, advisories, and technical guidance. Solid understanding of cybersecurity frameworks including NIST 800-61, MITRE ATT&CK, and defense-in-depth principles. Deep familiarity with federal cybersecurity regulations, including FISMA, FedRAMP, and DOC/OMB security guidelines. Excellent written and verbal communication skills, including the ability to brief technical content to non-technical audiences.

LTS

is committed to offering eligible employees comprehensive benefits that will provide them with options intended to meet their needs and the needs of their family. Seniority level

Seniority level Mid-Senior level Employment type

Employment type Full-time Job function

Job function Information Technology Industries IT Services and IT Consulting Referrals increase your chances of interviewing at LTS by 2x Get notified about new Cyber Security Analyst jobs in

Washington, DC . Washington, DC $110,000.00-$125,000.00 1 week ago Cybersecurity Engineer/Analyst (Junior Level | 1-2 years exp.)

Washington, DC $120.00-$125.00 1 month ago Cybersecurity Engineer/Analyst (Junior Level | 1-2 years exp.)- Fairfax County

Security Operations Center (SOC) Analyst

2026674 Cyber Security Analyst $175,000.00

McLean, VA $10,000.00-$175,000.00 1 day ago Information Assurance/ Security Specialist

Washington, DC $110,000.00-$125,000.00 1 week ago Information Security Analyst (SOC 2 Compliance)

Fairfax, VA $92,400.00-$115,000.00 1 month ago FBI Special Agent: Cybersecurity/IT Expertise

Arlington, VA $99,461.00-$128,329.00 1 day ago Washington, DC $122,000.00-$183,000.00 2 weeks ago Security Operations Center (SoC) Analyst

Sterling, VA $70,000.00-$85,000.00 2 weeks ago Cybersecurity SME Level 1,2,3 in Greater DC Metro Area

Washington, DC $103,000.00-$154,000.00 2 days ago Chantilly, VA $10,000.00-$180,000.00 1 day ago We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.

#J-18808-Ljbffr