Incident Response Analyst

Arlington, VA

Applications have closed

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions. 

View all jobs at Agile Defense

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Job Title: Incident Response Analyst (Req #520)
Location: 1110 N. Glebe Rd Arlington, Virginia 22201
Clearance Level: Active Top Secret  SUMMARY: Agile Defense Company is currently seeking an Incident Response Analyst with advanced skillsets in Digital Forensic & Incident Response (DFIR), Cyber Hunting and operate cyber security capabilities for a variety of federal customers and critical infrastructure entities.  Candidates should have excellent written and oral communication skills, be able to work independently and as part of a team, with demonstrated leadership capabilities.     
Primary skillsets and experience include Hunt, Digital Forensic & Incident Response, Malware/Firmware Analysis, within Operational Technology environments (skills in more than one cyber discipline are preferred) are required for this position.     The ideal candidate will have hands-on experience supporting a team of skilled, technical resources focused on as an analyst or infrastructure admin, experience as a technical team lead within the Security Operation Center.     A solid understanding of cyber threats, ICS Kill Chain, MITRE ATT&CK for ICS, PERA Model and information security in the domains of TTP’s, Threat Actors, Campaigns, and Observables. Additionally, the ideal candidate would be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management.    Corporate duties such as solution/proposal development, corporate culture development, mentoring employees, supporting recruiting efforts, will also be required.  In addition, flexibility in work locations within the DC Metro Area and performing varying duties is a must.
This program is a specialized hunt and IR team focused on threat activity within ICS/SCADA environments for federal and non-federal entities.
JOB DUTIES AND RESPONSIBILITIES·       Travel up to twenty (20%) percent of the time to support Incident Response and Cyber Hunts ·       Contribute or manage a hunt to provide cyber hunt and incident response to Critical Infrastructure entities providing comprehensive  ·       Conduct quality assurance reviews of all activities through reviewing of metrics and case analysis·       Serve as a technical OT/IT Cyber Hunt SME and onsite task lead ·       Lead a technical team that performs the following·       respond to and identify cybersecurity incidents within OT/IT environments and provide recommendations to affected entities to prevent the reoccurrence of these incidents within a variety of critical infrastructure sectors. ·       applies specific functional knowledge to resolve cybersecurity incidents and perform proactive threat hunts. Develop or contribute to solutions to a variety of problems of moderate scope and complexity. ·       provides industry experience and expertise for one or multiple critical infrastructure sectors/sub-sectors, including but not limited to Power, Water, Transportation, and Manufacturing ·       follows pre-defined procedures for Incident Response and Cyber Hunts.·       provides expertise to define procedures for response to customer cyber security incident in the industrial control system environment.·       applies tailored incident response and threat hunting tradecraft to industrial control system/critical infrastructure environments-with a deep understanding of the nuance and constraints of industrial environments.·       Seamlessly work alongside a team of host, network, and cloud forensic analysts to meet the mission requirements for both incident response and threat hunting engagements.·       Serves as liaison with various customers (internal and external)·       Acts as a subject-matter expert to multiple tasks and/or programs·       Be involved with highly technical operations and forensic analysis and serve as consultants, continuously advising client decision makers.·       Maintain accurate records of incident response activities and findings.·       Prepare and deliver incident reports to management and stakeholders.·       Research, evaluate, recommend, and design new security technologies and supporting infrastructure·       Develop technical cyber security solutions in response to customer requests or in support of proposal solution development·       Provide technical writing support in support of corporate response to RFPs/RFQs from various customers·       Support new XOR engagements as transitional program or operations lead·       Support documentation of all business and workflow processes in this area·       Provides technical consultation in cyber security capability development·       Maintains current knowledge of relevant cyber security and related technologies as assigned
QUALIFICATIONSEducation, Background, and Years of Experience·       At least 5 years of experience in a cyber network defense environment performing analysis and engineer functions and 2 years of experience as a team lead or operations management·       Bachelor’s Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, or Electrical Engineering
ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills·       At least 5 years of experience in a cyber network defense environment performing analysis and engineer functions and 2 years of experience as a team lead or operations management·       Bachelor’s Degree in Information Technology, Cyber Security, Computer Science, Computer Engineering, or Electrical Engineering.·       Active Top Secret·       Need to be comfortable working in a team environment and collaborating to meet mission goals.·       Be a Self-starter with strong attention to detail and critical thinking ability.·       Have a strong customer-service orientation with excellent written and oral communication skills.·       The ability to self-teach and self-test new tools and methodologies, and to problem-solve independently.·       There is an onsite requirement for minimum one day (1) week, with up to 3 days depending on situational requirements.·       Strong analytical and technical skills in computer network defense operations, triage, investigation, and incident response efforts·       Previous hands-on experience with a Security Information and Event Monitoring (SIEM) platforms and log management systems that perform log collection, analysis, correlation, and alerting (preferably within Splunk or Elk).·       Prior experience and ability to with analyzing information technology security events to discern events that qualify as a legitimate security incident as opposed to non-incidents. This includes security event triage, incident investigation, implementing countermeasures, and conducting incident response.·       Existing Subject Matter Expertise of Advanced Persistent Threat or Emerging Threats.·       Strong proficiency in report writing and briefing senior management·       Excellent organizational and attention to details in tracking activities within various Security Operation workflows.
Preferred Skills·       Experience in mentoring and training mid-level and senior analysts.·       Certifications: GREM, GFCA GISCP, GRID, GCIA, or GCIA, OSCP, GPEN.·       Experience on USG Cyber Protection Teams, a plus. ·       Experience performing digital forensics and analysis on a variety of vendor/OEM equipment—including but not limited to laptop/desktops, servers PLC’s, HMI’s, Historians, and related SCADA systems.·       Experience with SIEM (Splunk) —threat hunting, analytic development, dashboards, and reporting.·        Ability to automate simple/repeatable but critical tasks using scripting language (Python, Powershell)
WORKING CONDITIONS:
Environmental Conditions·       Hours: Monday - Friday, with 20% of travel.
Strength Demands·       Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs.  A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
Happy - Be Infectious.Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  4  3  0

Tags: Agile C Clearance Cloud Computer Science DFIR ELK Forensics GCIA GPEN GREM ICS Incident response Industrial Intrusion detection Malware MITRE ATT&CK Monitoring OSCP PowerShell Python SCADA Scripting SIEM Splunk Threat detection Top Secret

Perks/benefits: Gear Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.