Cyber Incident Handler (Cybersecurity)
Мэтч & Сопровод
Для мэтча с этой вакансией нужен Plus
Описание вакансии
TL;DR
Cyber Incident Handler (Cybersecurity): Evaluating security alerts and analyzing network events for the Department of War information network with an accent on event triage and threat mitigation. Focus on coordinating incident response, utilizing SIEM tools, and documenting end-to-end resolution processes.
Location: 100% On-site at Fort Huachuca, AZ. Must have an active DoD Secret Clearance to start.
Company
is a defense contractor providing adaptive innovation and advanced technology integration to support national security missions.
What you will do
- Evaluate security alerts and analyze network events to determine their impact on current operations.
- Conduct initial event triage and formulate response strategies to mitigate threats to the information network.
- Collaborate with senior team members to investigate and resolve security events.
- Synthesize alert data into actionable reports and contribute to the improvement of security operations documentation.
- Coordinate across the enterprise to ensure network security devices are properly monitored and alerting.
- Identify security risks and exposures to suggest procedures for halting future incidents.
Requirements
- Active DoD Secret Clearance (Must have to start).
- One of the following certifications prior to start: GMON, GRID, CEH, Cloud+, CySA+, GSEC, PenTest+, Security+, or SSCP.
- Experience in IDS/SIEM monitoring, event triage, multi-source data analysis, and incident response coordination.
- Knowledge of TTPs, exploits, and end-to-end incident documentation.
- Educational background: Bachelor's in CS/Cybersecurity (2 years exp), Associate's (4 years exp), or 6 years of experience without a degree.
- Foundational understanding of cybersecurity controls and adherence to security policies.
Nice to have
- Familiarity with MISP for threat intelligence sharing and IOC management.
- Experience with ServiceNow Security Operations (SecOps) module.
- Proficiency with Elastic Stack or Splunk for alert triage and event correlation.
- Working knowledge of NIST SP 800-61 and DoD/Army incident response policy frameworks.
- Experience with digital forensics tools and operating in a 24/7 CSSP or SOC environment.
Culture & Benefits
- Culture defined by the "6Hs": Happy, Helpful, Honest, Humble, Hungry, and Hustle.
- Supportive, family-like environment where collaboration and mutual respect are prioritized.
- Opportunity to work on critical national security and civilian missions.
- Emphasis on professional growth, innovation, and a relentless work ethic.
Будьте осторожны: если работодатель просит войти в их систему, используя iCloud/Google, прислать код/пароль, запустить код/ПО, не делайте этого - это мошенники. Обязательно жмите "Пожаловаться" или пишите в поддержку. Подробнее в гайде →