Incident Response Analyst with TS/SCI clearance (on site Northern Virginia)
Virginia - Washington DC Metro - Remote
Full Time Mid-level / Intermediate Clearance required USD 69K - 128K *
Salesforce
Bieten Sie die beste Customer Experience mit einem einzigen CRM-Tool für Sales, Kundenservice, Marketing, Commerce & IT. Jetzt 30 Tage testen!To get the best candidate experience, please consider applying for a maximum of 3 roles within 12 months to ensure you are not duplicating efforts.
Job Category
Software EngineeringJob Details
About Salesforce
We’re Salesforce, the Customer Company, inspiring the future of business with AI+ Data +CRM. Leading with our core values, we help companies across every industry blaze new trails and connect with customers in a whole new way. And, we empower you to be a Trailblazer, too — driving your performance and career growth, charting new paths, and improving the state of the world. If you believe in business as the greatest platform for change and in companies doing well and doing good – you’ve come to the right place.
Computer Security Incident Response Analyst
*This is a customer-facing role and will require you to be on-site on Northern Virginia. This is NOT a remote position.*
Salesforce - the leader in enterprise cloud computing and one of the top 10 places to work according to Fortune magazine - is seeking an Incident Response Analyst for our Government Cloud Security Operations team.
As part of the Salesforce National Security (SNS) Cloud Security Operations (SecOps), the Incident Response Analyst will work on the ‘front lines’ of Salesforce environments supporting US Government agencies and departments performing national security functions. SNS Cloud SecOps protects our critical infrastructure and our customers’ data from the latest information security threats. SNS Cloud SecOps is responsible for 24x7x365 security monitoring, security operations, real-time analysis of security alert data, and rapid incident response across SNS Cloud environments.
PLEASE NOTE: Qualification for this job is contingent upon acceptable results from a background investigation as well as your having and maintaining the specific level of U.S. government background investigation and clearance required for this role.
Role Description:
The Incident Response Analyst will respond to and investigate cyber security events within the SNS Cloud environments, track and document security events and incidents in a ticketing system, and analyze log data for signs of malicious activity in a Security Information and Event Manager (SIEM).
The Analyst will need to work across multi-disciplined teams to coordinate incident response actions for high-priority, high-transparency operations security issues to drive toward a resolution while meeting required service-level agreements, escalating as appropriate, and providing regular updates to senior leaders.
This position offers a challenging opportunity to be exposed to a diverse set of security disciplines, including incident response, forensics, reverse engineering, malware analysis, intrusion detection, network security, and system security.
This position provides opportunities to automate workflows and processes, develop new analytics and apply mitigations for adversary Tactics, Techniques, and Procedures (TTPs), and hunt for undetected indicators of compromise.
This position may require you to provide periods of 24x7 on-call support on an as-needed basis.
As we work with Government customers, this position may require occasional local travel to customer sites.
Minimum Qualifications:
The candidate must be a U.S. citizen and must have an active U.S. Government Top Secret/SCI security clearance with Polygraph.
A related technical degree, such as Computer Science, Software Engineering, Cybersecurity, Information Assurance, or equivalent work experience.
4+ years experience in cybersecurity, engineering, and/or incident response roles.
Strong interpersonal and communication skills required for coordinating responses to sophisticated incidents across the organization with many non technical and technical stakeholders.
Strong problem solving ability to determine solutions to encountered or anticipated challenges.
Robust technical understanding of the information security threat landscape (attack vectors and tools, best practices for securing systems and networks, etc.).
An in-depth understanding of TCP/IP network protocols and application layer protocols (e.g., HTTP, SMTP, DNS, etc.).
Experience with one or more SIEMs, like Splunk, Azure Sentinel, ElasticStack, etc.
Desired Skills:
Technical understanding of the information security threat landscape, to include attack vectors, tools, best practices for securing systems and networks, etc.
Familiarity with incident response and security operations within cloud environments.
Familiarity with Mac OSX, Microsoft Windows, and Linux/Unix system administration and security controls.
Technical understanding of AWS, Azure, or GCP administration and security controls.
Experience creating and managing event and metric dashboards with tools like Splunk, Kibana, Grafana, etc.
Experience with data query languages, such as SQL, SPL, GraphQL, etc.
Scripting language (i.e. Bash, Python, etc.) and workflow automation experience.
Operational experience monitoring devices such as network and host-based intrusion detection systems, web application firewalls, database security monitoring systems, firewalls/routers/switches, proxy servers, antivirus systems, file integrity monitoring tools, and operating system logs.
System forensics/investigation skills, including analyzing system artifacts (file system, memory, running processes, network connections) for indicators of infection/compromise.
Relevant information security certifications, such as CISSP, GCFR, GCIA, GCIH or other related certifications.
#LI-Y
This candidate must be a U.S. citizen (U.S. born or naturalized) who does not hold dual citizenship and agrees to complete a U.S. federal government Minimum Background Investigation (MBI) for a Moderate Public Trust position.This position requires a USA TS/SCI with Polygraph security access level.Accommodations
If you require assistance due to a disability applying for open positions please submit a request via this Accommodations Request Form.
Posting Statement
At Salesforce we believe that the business of business is to improve the state of our world. Each of us has a responsibility to drive Equality in our communities and workplaces. We are committed to creating a workforce that reflects society through inclusive programs and initiatives such as equal pay, employee resource groups, inclusive benefits, and more. Learn more about Equality at www.equality.com and explore our company benefits at www.salesforcebenefits.com.
Salesforce is an Equal Employment Opportunity and Affirmative Action Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender perception or identity, national origin, age, marital status, protected veteran status, or disability status. Salesforce does not accept unsolicited headhunter and agency resumes. Salesforce will not pay any third-party agency or company that does not have a signed agreement with Salesforce.
Salesforce welcomes all.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Antivirus Automation AWS Azure Bash CISSP Clearance Clearance Required Cloud Computer Science DNS Firewalls Forensics GCIA GCIH GCP Grafana Incident response Intrusion detection Linux Malware Monitoring Network security Polygraph Python Reverse engineering Scripting SecOps Security Clearance Sentinel SIEM SMTP SNS Splunk SQL TCP/IP Top Secret TS/SCI TTPs UNIX Windows
Perks/benefits: Startup environment Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.