Mid. Cyber Incident Coordinator

ECS Tech IncArlington, VA
1dOnsite

About The Position

ECS is seeking a Mid. Cyber Incident Coordinator to work out of our Arlington, VA office. ECS is seeking talented professionals to join our successful and growing team supporting the Cybersecurity and Infrastructure Security Agency’s (CISA) Joint Cyber Defense Collaborative (JCDC). The JCDC is CISA’s flagship initiative for uniting government, industry, and international partners to proactively defend against cyber threats. Our ECS team is at the center of providing support to JCDC as they continue to plan, share, and respond to cyber threats in real time to support the greater cyber community and we are looking to grow our team supporting this critical mission. We are looking for a Mid. Cyber Incident Coordinator for a team that provides deep technical analysis of cyber threat intelligence and operational data, correlating information across available datasets, and producing actionable context to support detection, threat hunting, and incident response activities. This position will support a team that interfaces extensively with multiple organizations within CISA including Vulnerability Management (VM) and Threat Hunt (TH) to provide guidance and analysis on active cyber threats for JCDC partners. This position emphasizes analytical rigor, contextualization, and effective communication in support of coordinated cyber defense operations across government and partner organizations. The Mid. Cyber Incident Coordinator will support a team that works closely with many stakeholders, including DHS CISA TH and VM, Agency security analysts / user groups, and the ECS team to ensure alignment between solution development and needs of stakeholders. The coordinator will perform research and assist with solutions for specific IOCs and IOAs. The coordinator will aid in defining tools, processes, and procedures for advancing Threat Hunting and Incident Response capabilities within CISA, FCEB, CI and SLTT.

Requirements

  • US citizenship with the ability to obtain and maintain DHS Suitability (EOD).
  • Active TS security clearance and SCI eligible.
  • On-site 3-5 days per week in Arlington, VA.
  • 6+ Years of previous experience in a threat intelligence, cyber security, incident response, or similar role
  • Strong understanding of computer and network fundamentals
  • Experience in cyber threat intelligence analysis, cyber incident analysis, or related cybersecurity roles.
  • Working knowledge of threat hunting concepts and detection methodologies.
  • Familiarity with detection logic frameworks and concepts (e.g. behavioral detection, SIGMA, YARA).
  • Strong analytical writing skills with the ability to produce clear, defensible documentation.
  • With minimum support perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process
  • Excellent written and oral communication skills
  • An understanding of current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source
  • Experience working in collaborative, multi-stakeholder environments.

Responsibilities

  • Analyze cyber threat intelligence and related reporting to assess relevance, credibility, and potential operational impact.
  • Correlate intelligence with internal datasets and partner-provided information to identify patterns, behaviors, and emerging threats.
  • Apply threat hunting and detection analysis techniques to provide contextual insights that support detection and response activities.
  • Contribute analytical findings and behavioral context to inform the development and refinement of detection logic, including SIGMA and YARA-based detections.
  • Support the development of written guidance and recommendations to assist JCDC partners with solutions for active and ongoing cyber vulnerabilities.
  • Stay current with emerging technologies and trends in cybersecurity, and apply this knowledge to improve threat detection and mitigation efforts.
  • Through hands-on analysis provide insights into vulnerabilities, adversarial tactics, and mitigation strategies across diverse environments like IT, OT/ICS, cloud, and AI systems.
  • Assist with mapping technical insights on cyber threats to frameworks like MITRE ATT&CK and other cyber frameworks.
  • Support collaboration and information sharing across internal teams and external partners in alignment with the JCDC mission.
  • Participate in operational coordination activities and briefing as required.

Stand Out From the Crowd

Upload your resume and get instant feedback on how well it matches this job.

Upload and Match Resume

What This Job Offers

Job Type

Full-time

Career Level

Mid Level

Education Level

No Education Listed

Number of Employees

1-10 employees

© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service