ManTech - Herndon, VA

posted 12 days ago

Full-time
Herndon, VA
Professional, Scientific, and Technical Services

About the position

The Cyber Incident Detection and Response Analyst at ManTech International plays a crucial role in safeguarding national security by identifying, analyzing, and responding to cybersecurity threats and incidents. This position is integral to the Network Operations Security Center (NOSC) and requires expertise in threat detection, incident response, and cybersecurity best practices. The analyst will work closely with other cybersecurity teams and provide 24/7 support to ensure the protection of DHS infrastructure and data.

Responsibilities

  • Provide 24/7 support for incident data flow and response, content, and remediation.
  • Monitor network traffic and system logs for signs of cyber threats and suspicious activity.
  • Perform the role of Incident Coordinator for IT Security events requiring focused response, containment, investigation, and remediation.
  • Perform real-time proactive event investigation on various security enforcement systems, such as SIEM, Anti-virus, Internet content filtering/reporting, malcode prevention, Firewalls, IDS & IPS, Web security, antispam, etc.
  • Assist with forensic analysis on hosts supporting investigations.
  • Conduct malware analysis in out of-band environment (static and dynamic), including complex malware.
  • Analyze operational anomalies, network behavior and perform mitigation actions derived from cyber threat monitoring and anomaly analysis.
  • Perform quality assurance on Incident Closures.
  • Assist with Knowledge Management - Standard Operating Procedures and procedural support data.
  • Develop and implement detection use cases and signatures to enhance threat identification capabilities.
  • Respond promptly to security incidents, conducting thorough investigations and mitigating threats.
  • Stay current with emerging threats and vulnerabilities, updating detection and response strategies accordingly.
  • Produce comprehensive incident reports, including root cause analysis and recommendations for future prevention.
  • Work closely with other cybersecurity teams, including threat intelligence, vulnerability management, and risk assessment.
  • Communicate findings and provide actionable recommendations to management and other relevant parties.
  • Participate in cybersecurity exercises and incident response training to maintain a high state of readiness.
  • Continuously assess and improve incident detection and response processes.
  • Provide training and guidance to junior analysts and other team members.

Requirements

  • An 8570 compliant certification
  • One of the following relevant certifications: Certified Information Systems Security Professional (CISSP), Certified Incident Handler (GCIH), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH)
  • A bachelor's degree in computer science, information technology, cybersecurity, or a related field of study (or equivalent experience)
  • A minimum of 7 years of experience in cybersecurity, with a focus on incident detection and response
  • Proficiency with SIEM tools (e.g., Splunk, ArcSight)
  • Experience with intrusion detection/prevention systems (IDS/IPS), endpoint detection and response (EDR) tools, and firewalls
  • Strong understanding of network protocols, operating systems, and security architectures
  • Familiarity with digital forensics tools and techniques.

Nice-to-haves

  • Experience working in a government or defense environment
  • Familiarity with DHS policies and procedures
  • Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001)
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service