Incident Response Analyst

OneZero Solutions
3dHybrid

About The Position

We are an employee-centric company that truly appreciates our team members and their value to our customers and the missions they support. We pride ourselves on being forward-leaning thinkers and fostering teams that are and continue to be technically proficient and technically capable across a comprehensive range of cyber mission areas. OneZero full-time employees receive an extremely competitive benefits package that includes health/dental/vision/life insurance plans, 401K with company matching, PTO & paid holidays, employee referral program, and educational assistance. Additional details can be found on our website at: https://www.onezerollc.com/careers/ Position Title: Incident Response Analyst Location: Washington DC (Hybrid remote) must be in the DMV area Clearance: TS/SCI

Requirements

  • Demonstrated 7 years of experience in Cyber Security and/or Cyber Defense.
  • Working knowledge of DoD Incident response standards and methodologies
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Strong problem-solving abilities with an analytic and qualitative eye for reasoning
  • Ability to independently prioritize and complete multiple tasks with little to no supervision
  • Must possess a DOD 8570 IAT III qualifying certification
  • Must possess one more of the following CSSP-IR qualifying certifications are preferred: CFR CEH CCNA Cyber Ops CCNA-Security CySA+ CHFI GCIH GCFA SCYBER PenTest+

Responsibilities

  • Utilize state-of-the-art technologies such as host forensics tools(FTK/Encase), Endpoint Detection and Response tools, log analysis (Elastic), and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
  • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response.
  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
  • Lead Incident Response activities and mentor junior SOC staff.
  • Work with key stakeholders to implement remediation plans in response to incidents.
  • Effectively investigate and identify root cause findings, then communicate findings to stakeholders, including technical staff, and leadership.

Benefits

  • health/dental/vision/life insurance plans
  • 401K with company matching
  • PTO & paid holidays
  • employee referral program
  • educational assistance
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service