Cyber Defense Incident Responder, Senior

The Challenge:

Are you ready to take a strategic role in cyber defense? Do you want to use your experience based knowledge to protect critical infrastructure from the constant onslaught of cyber attacks? If you want a position that uses your extensive threat analysis skills to perform advanced threat identification and complex incident response, you want to be a Tier 3 SOC analyst.

As an analyst on our SOC team, you’ll analyze logs, forensic data, and threat intelligence to find the advanced threats that are escaping detection. Using your deep understanding of your customer’s networks, combined with your cyber security experience, you’ll analyze patterns to understand attackers’ goals and stop them from succeeding. Once you find the adversary in the SEIM’s blind spot, you’ll advise the customer on ways to close the gaps and harden their network. Let’s outsmart malicious actors and protect critical infrastructure. This position is open to remote delivery anywhere within the U.S., to include the District of Columbia.

Empower change with us.

You Have:

  • 6+ years of experience in Malware analysis, digital forensics, data and network analysis, penetration testing, information assurance, trends analysis, quality control analysis, information assurance, or vulnerability management

  • Knowledge of cyber attackers, including script kiddies, non-nation state sponsored, and nation sponsored

  • Knowledge of system administration, network, and operating system hardening techniques

  • Knowledge of cyber attack stages, including reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, and covering tracks

  • Knowledge of the common networking and routing protocols, including TCP/IP, and services, including web, mail, and DNS

  • Knowledge of OWASP Top 10

  • Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies

  • Ability to design incident response for cloud service models and incident response handling methodologies

  • TS/SCI clearance

  • Bachelor's degree

Nice If You Have:

  • Experience identifying, capturing, containing, and reporting malware

  • Experience with securing network communications

  • Experience performing damage assessments

  • Experience using security event correlation tools and design incident response for cloud service models

  • Knowledge of preserving evidence integrity according to standard operating procedures or national standards

  • Ability to recognize and categorize types of vulnerabilities and associated attacks

  • Ability to protect a network against malware, including, NIPS, anti-malware, restrict and prevent external devices, and spam filters

  • Possession of strong written and verbal communication skills

  • Security+, CISSP, CASP, or GCED Certification


Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance is required.


The proposed salary range for this position in Colorado is 100,000 to 113,000. Final salary will be determined based on various factors.

At Booz Allen, we celebrate your contributions, provide you with opportunities and choice, and support your total well-being. Our comprehensive benefit offerings include healthcare, retirement plan, insurance programs, commuter program, employee assistance program, paid and unpaid leave programs, education assistance, and childcare benefits.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen cyber. When you join Booz Allen, we’ll help you develop the career you want.

  • Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

  • Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.

  • Cyber University — CyberU has more than 5000 instructor-led and self-paced cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

  • Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in cybersecurity—fully funded without a tuition cap.

  • Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.


Not ready to apply? Join our talent community and sign up for job alerts.