ClearanceJobs
Cyber Defense Incident Responder
Public Trust offers a competitive salary range of $125,000 - $150,000 for this position. The role is located in Washington, DC, and requires on-site presence. Responsibilities include: Responding to cyber incidents, including SOC IR phone calls and emails from the client and customer POCs. Providing support in detection, responses, mitigation, and reporting of cyber threats affecting internal and external clients' networks. Maintaining an understanding of current vulnerabilities, response, and mitigation strategies used in the cyber security operation center. Developing documentation, reports, briefs, and reviewing SOPs with the customer to give an accurate depiction of the current threat landscape and associated risk affecting the clients' networks. Providing analysis for correlated information sources notified by the Cyber SOC Team Lead or the Government Watch Officer. Acting as a Subject Matter Expert in investigations for potential incidents at the SOC Tier 1 Level. Analyzing and reporting cyber threats and assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Working with SOC federal staff, Shift Lead, Senior Analyst to analyze, triage, contain, and remediate security incidents. Following Federal IRP, SOC SOPs, and other prudent documentation procedures to work effectively while aiming for process improvement. Knowledgeable on multiple technology and system types and able to articulate the incident response lifecycle. Qualifications include: Bachelor's with 8+ years of cyber defense incident handling experience (or commensurate experience). 7+ years of SOC experience, 3+ years working at a senior/lead capacity. Direct experience executing Incident Handling and Response activities. Understanding of Security tools and the Security Stack. Working knowledge of Splunk. Basic understanding of network protocols and packet analysis tools. Cyber Security background. Certification: Splunk Fundamentals I & II and one or more advanced certifications including but not limited to: CISSP, GCIH, GCIA. Clearance Required: Ability to maintain a Public Trust clearance. Group ID: COMPHLP
Public Trust offers a competitive salary range of $125,000 - $150,000 for this position. The role is located in Washington, DC, and requires on-site presence. Responsibilities include: Responding to cyber incidents, including SOC IR phone calls and emails from the client and customer POCs. Providing support in detection, responses, mitigation, and reporting of cyber threats affecting internal and external clients' networks. Maintaining an understanding of current vulnerabilities, response, and mitigation strategies used in the cyber security operation center. Developing documentation, reports, briefs, and reviewing SOPs with the customer to give an accurate depiction of the current threat landscape and associated risk affecting the clients' networks. Providing analysis for correlated information sources notified by the Cyber SOC Team Lead or the Government Watch Officer. Acting as a Subject Matter Expert in investigations for potential incidents at the SOC Tier 1 Level. Analyzing and reporting cyber threats and assisting in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions. Working with SOC federal staff, Shift Lead, Senior Analyst to analyze, triage, contain, and remediate security incidents. Following Federal IRP, SOC SOPs, and other prudent documentation procedures to work effectively while aiming for process improvement. Knowledgeable on multiple technology and system types and able to articulate the incident response lifecycle. Qualifications include: Bachelor's with 8+ years of cyber defense incident handling experience (or commensurate experience). 7+ years of SOC experience, 3+ years working at a senior/lead capacity. Direct experience executing Incident Handling and Response activities. Understanding of Security tools and the Security Stack. Working knowledge of Splunk. Basic understanding of network protocols and packet analysis tools. Cyber Security background. Certification: Splunk Fundamentals I & II and one or more advanced certifications including but not limited to: CISSP, GCIH, GCIA. Clearance Required: Ability to maintain a Public Trust clearance. Group ID: COMPHLP