Назад
Company hidden
1 час назад

Cyber Incident Handler - Associate (Cybersecurity)

Формат работы
onsite
Тип работы
fulltime
Грейд
junior
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Cyber Incident Handler - Associate (Cybersecurity): Monitoring security alerts and analyzing network events to mitigate threats to Department of War information networks with an accent on initial event triage and response strategies. Focus on investigating security events, synthesizing alert data into actionable reports, and improving security operations documentation.

Location: 100% On-site at Fort Huachuca, AZ

Company

Adaptive innovation provider supporting national security missions through the seamless integration of advanced technologies and elite expertise.

What you will do

  • Evaluate security alerts and analyze network events to determine their impact on operations.
  • Conduct initial event triage and formulate response strategies to mitigate threats to information networks.
  • Collaborate with senior team members to investigate and resolve security events.
  • Synthesize alert data into actionable reports for stakeholders.
  • Contribute to the continuous improvement of security operations and documentation.
  • Coordinate across the enterprise to ensure network security devices are properly monitored and alerting.

Requirements

  • Active DoD Secret Clearance (Must have to start).
  • One of the following certifications prior to start: GMON, GRID, CEH, Cloud+, CySA+, GSEC, PenTest+, Security+, or SSCP.
  • Educational background: BS/BA in CS/Cybersecurity/IT (0 years exp), AA/AS (2 years exp), or no degree (4 years exp).
  • Demonstrated experience in IDS/SIEM monitoring and event triage.
  • Knowledge of TTPs, exploits, and incident response coordination.
  • Foundational understanding of cybersecurity controls and adherence to security policies.

Nice to have

  • Familiarity with MISP for threat intelligence sharing and IOC management.
  • Experience with ServiceNow Security Operations (SecOps) module.
  • Proficiency with Elastic Stack or Splunk for event correlation and triage.
  • Working knowledge of NIST SP 800-61 and DoD/Army incident response policy frameworks.
  • Experience operating in a 24/7 CSSP or SOC environment supporting classified networks.

Culture & Benefits

  • Culture driven by the "6Hs": Happy, Helpful, Honest, Humble, Hungry, and Hustle.
  • Supportive team environment where collaboration and collective success are celebrated.
  • Commitment to transparency, ethical conduct, and mutual respect.
  • Focus on innovation and a relentless work ethic to advance national security missions.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →