Search

Senior Cyber Intrusion Detection Analyst

Vets Hired
locationWashington, DC, USA
PublishedPublished: 6/14/2022
Technology
Full Time

Job Description

Job Description

Overview

A Senior Cyber Intrusion Detection Analyst is needed to provide advanced incident response and monitoring support. This is a hybrid position based in Washington, D.C., covering 5th shift work (7am7pm Saturday & Sunday, Friday 11pm7am, and Tuesday 7am3pm).

Responsibilities

  • Respond to cyber incidents, including SOC incident response calls and emails.

  • Serve as Subject Matter Expert (SME) in investigations escalated from SOC Tier I & II analysts.

  • Investigate phishing attempts and other potential cyber threats.

  • Collaborate with SOC federal staff and Incident Handlers to triage, contain, and remediate incidents.

  • Participate in Splunk engineer working groups to improve alerting rules and reduce false positives.

  • Work closely with Threat Hunt and Security Intelligence teams to strengthen SOC capabilities.

  • Follow established incident response procedures, while identifying process improvement opportunities.

  • Manage incidents involving enterprise systems and sensitive data, including PII breaches.

  • Detect, collect, analyze, and report cybersecurity incidents.

  • Investigate and remediate malware infections.

  • Analyze a variety of logs and alerts (firewall, IDS, malware, HIPS, PCAP, proxy, Windows/Active Directory, etc.) to identify anomalous activity and document findings.

  • Conduct advanced log and malicious code reviews to support containment and recovery.

  • Assist with cybersecurity workforce development by reviewing tickets and annotations.

Required Qualifications

  • Bachelors degree with 8+ years of cybersecurity experience (or equivalent).

  • At least 6 years of intrusion detection examination experience.

  • Experience with a wide range of security technologies and logging data, including WANs, IPS/IDS/HIPS, web logs, raw data logs, and event reviews.

  • Strong knowledge of Splunk SIEM with 3+ years of advanced analytics experience (queries, Grep skills, firewall ACL review, Snort IDS events, PCAPs, and web server logs).

  • Strong written and verbal communication skills.

  • One or more advanced certifications, such as:

    • CERT Certified Computer Security Incident Handler

    • CEH (Certified Ethical Hacker)

    • CISSP

    • GCIH (Certified Incident Handler)

    • GISF (Information Security Fundamentals)

Clearance

  • Must be able to obtain and maintain a Public Trust clearance.

Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...