Cybersecurity Incident Response Lead

Key Role:

Serve as a technical lead and manager for commercial client tasks, including the assessment, design, and implementation of enterprise security prevention, detection, and response capabilities. Lead a diverse team of analysts in conducting event detection, incident triage, incident handling, and remediation. Handle major, high impact incidents, generate clear, concise recommendations, and coordinate activities and professional communications across a range of stakeholders. Work closely with client security teams to develop, tune, automate, and enhance network and host-based security devices and support the incident response fly away team with managing the response to client Cyber intrusions, performing extensive network and host triage, maintaining strict chain-of-custody, analyzing documentation and reports, and performing remediation, as required.

Basic Qualifications:

-Experience with using Microsoft Office Suite, including Word, Excel, and PowerPoint

-Knowledge of incident management and response activities across the incident life cycle

-Knowledge of security tools and techniques used by Cybersecurity teams
-Ability to consider technical obstacles and challenges in the broader business context

-Ability to manage and mold a team of high performing analysts to overcome new challenges

-Ability to adapt communications' style and messaging for professionals at all levels

-Ability to travel up to 80%, often on short notice

-Ability to obtain a security clearance

-BA or BS degree and 7 years of experience in a professional work environment
 

Additional Qualifications:

-2+ years of experience with leading staff in project or task delivery
-Experience with performing host and network forensics analysis, including using timestamps across different log types to develop authoritative timelines of activity to find evidence of malicious activity

-Experience with performing anomaly or malware hunts using a common framework and standard methodology, including the MITRE ATT&CK framework

-Experience with conducting digital memory acquisition using Volatility, Rekall, or similar tools and extracting malicious binaries for analysis

-Experience with setting up and using isolated machines or environments for malware detonation and indicator of compromise identification

-Experience with performing static code analysis, including dissecting suspicious subroutines in assembly

-Experience with common scripting languages, including Perl or Python in the context of incident response and security operations

-Knowledge of the following security-related technologies: IDS/IPS, SIEM, firewalls, Log Management, HIDS/NIDS, proxies, Endpoint Detection and Response, and other enterprise level appliances

-Ability to configure and execute live response forensics collection with tools that include Achoir or GRR Rapid Response
-Ability to be self-driven, work independently, and handle multiple tasks concurrently

-Possession of excellent oral and written communication skills

-Top Secret clearance preferred
-One or more of the following certifications:  GIAC Certified Incident Analyst (GCIA), Certified Computer Security Incident Handler (CSIH), GIAC Network Forensic Analyst (GNFA), GIAC Certified Forensic Analyst (GCFA), CREST Certified Incident Manager, CREST Certified -Network Intrusion Analyst

Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

Not ready to apply? Join our talent community and sign up for job alerts.