Top Secret Incident Response Analyst

Post Date

Nov 13, 2024

Location

Washington,
District Of Columbia

ZIP/Postal Code

20310
US
Feb 20, 2025 Insight Global

Job Type

Contract-to-perm

Category

Security Engineering

Req #

BAL-747170

Pay Rate

$54 - $68 (hourly estimate)

Job Description

An employer is looking for an Incident Response Analysts to sit in Alexandria, VA!

In this role, you will utilize alerts from endpoints, IDS/IPS, netflow, and custom sensors to identify compromises on customer networks and endpoints. You will perform junior- to intermediate-level reviews of massive log files, pivot between data sets, and correlate evidence for incident investigations. Additionally, you will pass triaged alerts to senior-level SOC personnel and assist in identifying malicious actors on customer networks. Your responsibilities also include documenting analysis, findings, and actions in a case/knowledge management system, as well as supporting senior-level SOC personnel with the creation and distribution of incident reports to customers and higher headquarters.



Compensation:

$50/hr to $55/hr.



Exact compensation may vary based on several factors, including skills, experience, and education.



Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.

We are a company committed to creating diverse and inclusive environments where people can bring their full, authentic selves to work every day. We are an equal opportunity/affirmative action employer that believes everyone matters. Qualified candidates will receive consideration for employment regardless of their race, color, ethnicity, religion, sex (including pregnancy), sexual orientation, gender identity and expression, marital status, national origin, ancestry, genetic factors, age, disability, protected veteran status, military or uniformed service member status, or any other status or characteristic protected by applicable laws, regulations, and ordinances. If you need assistance and/or a reasonable accommodation due to a disability during the application or recruiting process, please send a request to HR@insightglobal.com.

To learn more about how we collect, keep, and process your private information, please review Insight Global's Workforce Privacy Policy: https://insightglobal.com/workforce-privacy-policy/ .

Required Skills & Experience

Must have an active DoD Secret security clearance or higher, and ability to obtain TS/SCI

Must have DoD 8570 IAT II or higher certification (such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC, etc.) prior to starting.

Must be able to obtain DoD 8570 CSSP-Analyst certification (such as CEH, CySA+, GCIA, etc.) within 6 months of starting.

Bachelor's degree and 3+ years of prior relevant experience; additional military service and/or relevant work experience may be considered in lieu of degree.

1+ years of prior incident handling/response experience.

CND experience (Protect, Detect, Respond and Sustain) within a Computer Incident Response organization.

Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).

In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic).

Nice to Have Skills & Experience

Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations

Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.

Experience with malware analysis concepts and methods.

Unix/Linux command line experience.

Scripting and programming experience.

Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports on analytic findings.

Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.

Benefit packages for this role will start on the 31st day of employment and include medical, dental, and vision insurance, as well as HSA, FSA, and DCFSA account options, and 401k retirement account access with employer matching. Employees in this role are also entitled to paid sick leave and/or other paid time off as provided by applicable law.