Cybersecurity Incident Response Analyst, Senior in Boston, MA at Booz Allen Hamilton Inc.

Date Posted: 9/11/2018

Job Snapshot

Job Description

Job Number: R0032617

Cybersecurity Incident Response Analyst, Senior

Key Role:

Serve as a technical lead and manager for commercial client tasks, including the assessment, design, and implementation of enterprise security prevention, detection, and response capabilities. Lead a diverse team of analysts in conducting event detection, incident triage, incident handling, and remediation. Handle major high impact incidents, generate clear, concise recommendations, and coordinate activities and professional communications across a range of stakeholders. Work closely with client security teams to develop, tune, automate, and enhance network- and host-based security devices and support the incident response fly away team with managing the response to client Cyber intrusions, including performing extensive network and host triage, maintaining strict chain-of-custody, developing documentation and reports, and performing remediation, as required. This position requires the ability to travel up to 80% of the time, often on short notice.


Basic Qualifications:

-3+ years of experience with incident management and response activities across the incident life cycle

-Experience with Microsoft Office Suite, including Word, Excel, and PowerPoint

-Knowledge of the security tools and techniques used by Cybersecurity teams

-Ability to work independently and handle multiple tasks concurrently

-Ability to manage and shape a team of high performing analysts to overcome new challenges

-Ability to think of technical obstacles and challenges in the broader business context

-Ability to travel up to 80% of the time, often on short notice


Additional Qualifications:

-Experience with performing host and network forensics analysis, including using timestamps across different log types to develop authoritative timelines of activity to find evidence of malicious activity

-Experience with performing anomaly or malware hunts using a common framework and standard methodology, including the MITRE ATT&CK framework

-Experience with configuring and executing sweep parameters using tools, including GRR Rapid Response

-Experience with conducting digital memory acquisition using Volatility, Rekall, or similar tools and extracting malicious binaries for analysis

-Experience with setting up and using isolated machines or environments for malware detonation and indicator of compromise identification

-Experience with performing static code analysis, including dissecting suspicious subroutines in assembly

-Experience with common scripting languages, including using Perl or Python in the context of incident response and security operations

-Knowledge of the following security-related technologies: IDS/IPS, SIEM, firewalls, log management, HIDS/NIDS, proxies, endpoint detection and response, and other enterprise-level appliances

-Possession of excellent oral and written communication skills, including adapting style and messaging to communicate with professionals at all levels effectively

-BA or BS degree

-One or more of the following Certifications: GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, or CREST Certified Network Intrusion Analyst

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, or veteran status—to fearlessly drive change.

CB15, CMCL

Your Career is Waiting.

Get job alerts. Learn about new work and upcoming events. Share open roles with friends and colleagues.
Our Talent Network is your opportunity hub.


Get Answers and Access.

Need more information? Find it in our FAQs.

Application already in-process? Log in to keep going.