Назад
Company hidden
1 час назад

Cyber Incident Handler (Cybersecurity)

Формат работы
onsite
Тип работы
fulltime
Грейд
middle
Английский
b2
Страна
US
Вакансия из списка Hirify.GlobalВакансия из Hirify Global, списка международных tech-компаний
Для мэтча и отклика нужен Plus

Мэтч & Сопровод

Для мэтча с этой вакансией нужен Plus

Описание вакансии

Текст:
/

TL;DR

Cyber Incident Handler (Cybersecurity): Evaluating security alerts and analyzing network events for the Department of War information network with an accent on event triage and threat mitigation. Focus on coordinating incident response, utilizing SIEM tools, and documenting end-to-end resolution processes.

Location: 100% On-site at Fort Huachuca, AZ. Must have an active DoD Secret Clearance to start.

Company

hirify.global is a defense contractor providing adaptive innovation and advanced technology integration to support national security missions.

What you will do

  • Evaluate security alerts and analyze network events to determine their impact on current operations.
  • Conduct initial event triage and formulate response strategies to mitigate threats to the information network.
  • Collaborate with senior team members to investigate and resolve security events.
  • Synthesize alert data into actionable reports and contribute to the improvement of security operations documentation.
  • Coordinate across the enterprise to ensure network security devices are properly monitored and alerting.
  • Identify security risks and exposures to suggest procedures for halting future incidents.

Requirements

  • Active DoD Secret Clearance (Must have to start).
  • One of the following certifications prior to start: GMON, GRID, CEH, Cloud+, CySA+, GSEC, PenTest+, Security+, or SSCP.
  • Experience in IDS/SIEM monitoring, event triage, multi-source data analysis, and incident response coordination.
  • Knowledge of TTPs, exploits, and end-to-end incident documentation.
  • Educational background: Bachelor's in CS/Cybersecurity (2 years exp), Associate's (4 years exp), or 6 years of experience without a degree.
  • Foundational understanding of cybersecurity controls and adherence to security policies.

Nice to have

  • Familiarity with MISP for threat intelligence sharing and IOC management.
  • Experience with ServiceNow Security Operations (SecOps) module.
  • Proficiency with Elastic Stack or Splunk for alert triage and event correlation.
  • Working knowledge of NIST SP 800-61 and DoD/Army incident response policy frameworks.
  • Experience with digital forensics tools and operating in a 24/7 CSSP or SOC environment.

Culture & Benefits

  • Culture defined by the "6Hs": Happy, Helpful, Honest, Humble, Hungry, and Hustle.
  • Supportive, family-like environment where collaboration and mutual respect are prioritized.
  • Opportunity to work on critical national security and civilian missions.
  • Emphasis on professional growth, innovation, and a relentless work ethic.

Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →