Cyber Defense Incident Responder - Junior jobs in United States
cer-icon
Apply on Employer Site
company-logo

ECS · 12 hours ago

Cyber Defense Incident Responder - Junior

ECS is a leading information security and information technology company seeking a Junior Cyber Defense Incident Responder. The role involves supporting a full range of cyber security services, including analyzing network traffic, coordinating alerts, and documenting incidents.

Artificial Intelligence (AI)Cloud InfrastructureComplianceConsultingCyber SecurityInformation TechnologyMachine LearningSecuritySoftware
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Develop content for cyber defense tools
Characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
Coordinate with enterprise-wide cyber defense staff to validate network alerts
Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to an acceptable level
Document and escalate incidents (including event’s history, status, and potential impact for further action) that may cause ongoing and immediate impact to the environment
Perform cyber defense trend analysis and reporting
Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the effectiveness of an observed attack
Perform security reviews and identify security gaps in security architecture resulting in recommendations for inclusion in the risk mitigation strategy
Identify and analyze anomalies in network traffic using metadata
Conduct research, analysis, and correlation across a wide variety of all source data sets (indications and warnings)
Validate intrusion detection system (IDS) alerts against network traffic using packet analysis tools

Qualification

Incident response methodologiesNetwork traffic analysisCyber defense policiesVulnerability analysisPacket analysis toolsIntrusion detection systemsTeam coordinationResearchAnalysisWritten communicationVerbal communication

Required

Strong written and verbal communication skills
Ability to interpret the information collected by network tools (e.g., Nslookup, Ping, and Traceroute)
Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists)
Knowledge of vulnerability information dissemination sources (e.g., alerts, advisories, errata, and bulletins)
Knowledge of incident response and handling methodologies
Knowledge of front-end collection systems, including traffic collection, filtering, and selection
Experience with system administration, network, and operating system hardening techniques
Knowledge of cyber defense and information security policies, procedures, and regulations
Knowledge of the common attack vectors on the network layer
Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks)
In-depth understanding of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored)
Knowledge of various types of network communication (e.g., LAN, WAN, MAN, WLAN, WWAN)
Knowledge of file extensions (e.g., .dll, .bat, .zip, .pcap, .gzip)
Bachelor's degree or higher
4+ years' experience in Introductory information assurance, networks, sensor operations, network/data analysis, packet capture analysis, hunts methodologies, intelligence analysis
Certifications addressing new attack vectors (emphasis on cloud computing technology, mobile platforms and tablet computers), new vulnerabilities, existing threats to operating environments
Active Secret clearance or eligible to obtain a Secret clearance

Preferred

Experience in detecting host and network-based intrusions via intrusion detection technologies (e.g., Snort)
Ability to analyze malware, conduct vulnerability scans, and recognize vulnerabilities in security systems
Skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes
Experience evaluating the adequacy of security designs
Skill in using incident handling methodologies
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies
Experience with using protocol analyzers and collecting data from a variety of cyber defense resources
Experience reading and interpreting signatures (e.g., snort)
Experience with assessing security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NIST SP 800-53, Cybersecurity Framework, etc.)
Ability to accurately and completely source all data used in intelligence, assessment and/or planning products
Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation)

Company

ECS is a fast-growing 4,000-person, $1.2B provider of advanced technology solutions for federal civilian, defense, intelligence, and commercial customers.

Funding

Current Stage
Late Stage
Total Funding
unknown
2018-01-31Acquired
2015-04-10Private Equity

Leadership Team

leader-logo
Keith McCloskey
VP / Chief Technology Officer
linkedin
leader-logo
Ryan Garner
Chief Financial Officer
linkedin
Company data provided by crunchbase