Durham, North Carolina, USA
9 days ago
Incident Response Team Lead
REQ#: RQ188596Public Trust: None Requisition Type: Regular Your Impact

Own your opportunity to work alongside federal civilian agencies. Make an impact by providing services that help the government ensure the well being of U.S. citizens.

Job Description

We are seeking a highly motivated team member to fill the role of an Incident Response Team Lead.  This is a 100% remote position.

Coordinates and leads an incident response team to ensure an incident is effectively managed from detection to resolution for a federal agency security operations center.Serves as highest point of escalation for complex incidents.Briefs federal and internal management and stakeholders on the status of an incident; produces after action reports and additional metrics as requested.Mentors junior analysts in standardized incident handling processes.Performs triage, investigation, and closure of incident tickets. As part of the triage and investigation processes, the individual will use various tools to determine the validity, cause, and extent of reported security incidents.  Tools include intrusion detection and various threat analytics tools.Provides knowledge and expertise in tools, techniques, countermeasures, and trends in computer and network vulnerabilities and threats.Assists with creation of playbooks and standard operating procedures.Participates in rotating on call schedule for after-hours alerts/incidents.Investigates notable events from Splunk and Microsoft 365 Defender.

Required Qualifications:

BS or equivalent + 7 years related experience, or MS + 5 years related experience.Must have CompTIA Security+ , CompTIA Cyber Security Analyst+or equivalent.Excellent written and verbal communication skills.Ability to communicate effectively with stakeholders of various technical knowledge and managerial levels.Hands-on experience with a SIEM, performing searches and reviewing log sources.Must have recent hands-on experience with incident response life cycles including analysis, containment, eradication, recovery, and post incident activities.Must be a motivated, self-starter with a passion to learn and willingness to assist other team members as needed.Must be technical, quick learner, detailed oriented, independent, resourceful, and with an analytical mindset.Requires ability to pass a Public Trust suitability determination investigation. Preference will be made to individuals with a current or recent security clearance or Public Trust investigation.Proximity to Raleigh NC

Preferred Qualifications:

Experience using: Microsoft Security Defender Advanced Threat Protection, Microsoft Office 365, Microsoft Azure AD and Microsoft Cloud App Security.Experience in open-source tools for the use in investigating malware incidents.Experience using ServiceNow service management/ticketing systemExperience using Splunk Enterprise SecurityPrior performing incident response in support of a federal government agency is desirable.Microsoft, Splunk certifications, GIAC Certified Incident Handler (GCIH), EC-Council Certified Incident Handler (ECIH), EC-Council Certified Ethical Hacker (CEH) or other senior level certifications are highly desirable. Experience with creating Splunk content, dashboards, reports, and tuning existing alerts highly desired.PowerShell, Python, etc. scripting experience is nice to have.Network Packet capture (PCAP), report writing, remote forensics, Splunk UBA and Splunk SOAR experiences are nice to have.

Confirm your E-mail: Send Email