Salary
💰 $97,750 - $132,250 per year
Tech Stack
CloudCyber SecurityLinuxOpen SourceSplunkTypeScript
About the role
- Track and handle cyber security incidents/events from initial detection to final resolution
- Coordinate with appropriate parties to investigate and maintain communications
- Collaborate with specialty teams to investigate and resolve complex problems
- Troubleshoot security tools on the network to ensure successful operation
- Ensure ACAS vulnerability scanning mechanisms are operational and provide relevant results
- Perform Information Systems Security Officer (ISSO) duties and act as POC between parent organization and cyber security teams
- Conduct change requests, software authorizations, static code analysis, account reviews, and other A&A tasks
- Act as central point of contact for cyber security inquiries and redirect as necessary
- Perform incident handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, DLP
- Build and maintain ACAS infrastructure and provide remediation recommendations
Requirements
- TS/SCI security clearance (required)
- US Citizenship Required
- 3+ years of related experience in data security administration
- Associate Degree in Computer Science or related technical discipline, or equivalent combination of education, professional training or work experience
- 8570 Certification REQUIRED
- Minimum IAT II: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, SSCP
- Within 6 months of hire – CSSP Incident Responder (IR): CEH, CFR, CCNA Cyber Ops, CCNA-Security, CHFI, CySA+, GCFA, GCIH, SCYBER
- Preferred certifications: GCIH, GCFA, GCIA, GNFA, Linux+, CCNA R&S, Splunk Power User
- Proficient at navigating Windows 10/Server 2012/Server 2016
- Proficient at navigating Linux: Ubuntu/RHEL 6/7/8
- Basic scripting skills using Windows command-line, PowerShell, or BASH
- Understanding of network ports, protocols, and services
- Intrusion analysis via HBSS, Splunk or other SIEM tools, Windows Event Logging, OSINT
- Incident investigations via McAfee HBSS suite, SolarWinds, Cisco ISE, Cylance, Splunk, Phantom, StealthWatch, WireShark, ForeScout, ACAS, PowerShell, command-line tools
- Build and maintain ACAS infrastructure; analyze vulnerability scan results
- Strong desire to learn new skills; ability to multi-task and adapt; highly resilient; critical thinking skills; strong communication skills
- Travel Required: 25-50%