Guantanamo Bay, Kuwait
1 day ago
Incident Response Analyst
Overview Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism. The Defensive Cyber Operations (DCO) division within the USARCC-SWA is looking for a candidate with strong scripting abilities, experience with systems security administration, and network security technologies. The Incident Response Analyst will design, implement, automate, maintain, and optimize measures protecting systems, networks, and information. Program: OMDAC-SWACA This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program! You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position. Responsibilities Detect, document, and report potential or confirmed incidents and security issues. Analyze events utilizing Security Information Event Management (SIEM) systems, Big Data Analytics, and other supporting platforms or applications. Conduct Incident Handling actions in accord to established procedures. Staff, coordinate and perform Incident Response investigations. Conduct quality control of incidents and investigations to maintain compliance with applicable policies. Develop recommendations to enhance detection capabilities and implement mitigation measures in response to general or specific threats (attempted exploits, attacks, malware delivery, etc.). Design and integrate custom rules and reports within data collection platforms. Prepare technical summaries and briefings. Provide technical expertise regarding the defense of information systems and networks. Correlate event data to create situational awareness and trend analysis reports. The work environment will be 95% indoor and 5% outdoor. Perform additional duties as assigned. Qualifications Qualifications: Education / Certifications: One year of related experience may be substituted for one year of education, if degree is required. Associate Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field. This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows: IAT Level: CSSP Incident Responder BASELINE: Cisco: CCNA CyberOps Cisco: CCNA Security Cisco: SCYBER: Cybersecurity Specialty Certification CompTIA: CySA+ ce: Cybersecurity Analyst CompTIA: PenTest+ CyberSec: CFR: First Responder EC-Council CEH: Certified Ethical Hacker EC-Council: CHFI: Certified Hacking Forensic Investigator GIAC: GCFA: Certified Forensic Analyst: Certified Forensic Analyst GIAC: GCIH: Certified Incident Handler COMPUTING ENVIRONMENT (CE): Cisco: CCNP: Certified Network Professional (Any) EC Council: ECIH: Certified Incident Handler GIAC: GCFA: Certified Forensic Analyst GIAC: GCIA: Certified Intrusion Analyst GIAC: GCIH: Certified Incident Handler (preferred) GIAC: GCWN: Certified Windows Security Administrator GIAC: GDAT: Defending Advanced Threats GIAC: GREM: Reverse Engineering Malware GIAC: GSEC: Security Essentials Microsoft: 365 Certified: Enterprise Administrator Expert Microsoft: Certified: Azure Security Engineer Associate Microsoft: Certified: Azure Solutions Architect Expert Microsoft: MCSE: Core Infrastructure Microsoft: MCSE: Database Management and Analytics Microsoft: MCSE: Productivity Solutions Expert Offensive Security: Certified Expert Offensive Security: Certified Professional Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience. At least five (3) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security incident handling and SIEM event analysis. Experience with a customer service-oriented company We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
Confirm your E-mail: Send Email