What are the responsibilities and job description for the T2 Incident Responder - Day Shift (w/ active Secret) position at CriticalSolutions, LLC?
T2 Incident Responder - (w/ active Secret)
Location: Ashburn, Virginia
Clearance: Secret
Full-time/ No Remote
Shift Schedule: 7am - 7pm ET, SUN - TUE, every other WED
Job Description
Critical Solutions is seeking an experienced Incident Response Analyst to support a cyber security operations center (SOC) for a federal program in Ashburn, Virginia.
The IR will Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
Primary Roles And Responsibilities
Critical Solutions Pay And Benefits
Salary range $80,000 - $103,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Location: Ashburn, Virginia
Clearance: Secret
Full-time/ No Remote
Shift Schedule: 7am - 7pm ET, SUN - TUE, every other WED
Job Description
Critical Solutions is seeking an experienced Incident Response Analyst to support a cyber security operations center (SOC) for a federal program in Ashburn, Virginia.
The IR will Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
Primary Roles And Responsibilities
- Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
- Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
- Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
- Lead Incident Response activities and mentor junior SOC staff.
- Work with key stakeholders to implement remediation plans in response to incidents.
- Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
- Flexible and adaptable self-starter with strong relationship-building skills
- Strong problem-solving abilities with an analytic and qualitative eye for reasoning
- Ability to independently prioritize and complete multiple tasks with little to no supervision
- Active DoD Secret Clearance. Ability to obtain and maintain TS/SCI
- Bachelor's degree in Science or Engineering Field, IT, or Cybersecurity or related field
- 3 years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.
- Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.
- Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell
- CCFP - Certified Cyber Forensics Professional
- CCNA Security
- CCNP Security
- CEH - Certified Ethical Hacker
- CHFI - Computer Hacking Forensic Investigator
- CISSP - Certified Information Systems Security
- CIRC
- ECES - EC-Council Certified Encryption Specialist
- ECIH - EC-Council Certified Incident Handler
- ECSA - EC-Council Certified Security Analyst
- ECSS - EC-Council Certified Security Specialist
- EnCE
- ENSA - EC-Council Network Security Administrator
- FIWE
- GCFA - Forensic Analyst
- GCFE - Forensic Examiner
- GCIH - Incident Handler
- GISF - Security Fundamentals
- GNFA - Network Forensic Analyst
- GREM - Reverse Engineering Malware
- GWEB - Web Application Defender
- GXPN - Exploit Researcher and Advanced Penetration Tester
- LPT - Licensed Penetration Tester
- OSCE (Certified Expert)
- OSCP (Certified Professional)
- OSEE (Exploitation Expert)
- OSWP (Wireless Professional)
- WFE-E-CI
- FTK-WFE-FTK
- CompTIA Cyber Security Analyst (CySA )
- CompTIA Linux Network Professional (CLNP)
- CompTIA PenTest
- GCTI - Cyber Threat Intelligence
- GOSI - Open Source Intelligence
- CTIA - Certified Threat Intelligence Analyst
- Splunk Core Certified Advanced Power User
- Splunk Core Certified Consultant
- Splunk SOAR Certified Automation Developer
- IACRB Certified Security Awareness Practitioner (CSAP)
- Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC role
- Cyber Kill Chain Knowledge
- One of the following certs: CCNA, CCNP, CCSP, CEH, CNDA, DCITA, ECES, ECSA, ECSP, ECSS, ENSA, GCIA, GCIH, GISF, GNFA, GPPA, GWEB, LPT, OSCP, OSEE, SEI, CCISO
- 7am - 7pm ET, Sunday - Tuesday, and every other Wednesday
- In Office - Ashburn, VA
- Must be willing and able to commute to Ashburn, VA
Critical Solutions Pay And Benefits
Salary range $80,000 - $103,000. The salary range for this position represent the typical salary range for this job level and this does not guarantee a specific salary. Compensation is based upon multiple factors such as responsibilities of the job, education, experience, knowledge, skills, certifications, and other requirements.
BENEFIT SNAPSHOT: 100% premium coverage for Medical, Dental, Vision, and Life Insurance, Supplemental Insurance, 401K matching, Flexible Time Off (PTO/Holidays), Higher Education/Training Reimbursement, and more
Salary : $80,000 - $103,000