Incident Response Analyst, Mid (Swing Shift)

Tyto AtheneWashington, DC
14d$95,000 - $115,000Hybrid

About The Position

Tyto Athene is hiring an Incident Response Analyst, Mid (Swing Shift) to support a law enforcement customer in Washington, DC. Our Incident Response (IR) Analysts form the backbone of our cybersecurity services. You will play a critical role in securing our customers by monitoring our tools, triaging alerts, and investigating potential cyber threats. As a Security Operations Center (SOC) team member, you will also serve as the initial point of contact for cybersecurity incidents, ensuring prompt and effective responses. We provide a supportive environment for you to learn from senior SOC team members, cross-train for other positions, and attend external training. We want to see you grow and improve your cybersecurity skills. Join us and delve into the complexities of monitoring enterprise networks, learn basic incident response techniques, and how to effectively investigate phishing threats against our clients.

Requirements

  • 4+ years of professional IT experience with at least 1-2 years in a security operations role as a Watch Floor Analyst, IR Analyst, or similar discipline
  • Bachelor’s Degree or 4+ years of additional work experience in lieu of a degree
  • Experience with SIEM tools, Splunk or Crowdstrike are preferred
  • Knowledge of common attacker Tools, Techniques and Procedures (TTPs)
  • Knowledge of malware and/or digital forensics
  • Knowledge of enterprise architecture including zero trust principles
  • Knowledge of Windows and Linux operating systems
  • Knowledge of common phishing techniques and how to investigate them
  • Proficiency in technical writing and development of standard operating procedures (SOPs)
  • Able to accurately and succinctly convey information and status reports verbally, through email communications, and through delivering presentations
  • Comfortable in customer facing environments
  • Ability to maintain a positive customer service mentality
  • TS/SCI Clearance required

Nice To Haves

  • Experience with major cloud service providers
  • Working knowledge of regex and scripting languages (Python, PowerShell, Bash, etc.)
  • Any cybersecurity relevant certifications such as those from GIAC or CompTIA
  • The initiative to ask for assistance and offer fresh ideas to improve the SOC’s performance

Responsibilities

  • Utilize security tools to analyze, investigate, and triage security alerts
  • Monitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activity
  • Perform in-depth analysis and investigation of high-priority cybersecurity incidents
  • Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact
  • Collaborate with cyber threat hunting and cyber threat intelligence teams
  • Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.
  • Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System (IMS)
  • Learn new open and closed-source investigative techniques
  • Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
  • Help shape the evolution of processes and procedures of the SOC
  • Provide guidance and mentorship to Jr SOC Analysts to enhance their skills and capabilities

Benefits

  • Health/Dental/Vision
  • 401(k) match
  • Paid Time Off
  • STD/LTD/Life Insurance
  • Referral Bonuses
  • professional development reimbursement
  • parental leave

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Number of Employees

501-1,000 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service