Match score not available

Incident Response Team Lead

extra holidays - extra parental leave
Remote: 
Full Remote
Contract: 
Salary: 
128 - 173K yearly
Experience: 
Senior (5-10 years)
Work from: 

Offer summary

Qualifications:

BS or equivalent + 7 years experience, CompTIA Security+ or equivalent certification, Hands-on with SIEM and incident response cycles, Mentorship experience for junior analysts, US Citizenship required.

Key responsabilities:

  • Coordinate and lead incident response teams
  • Manage incidents from detection to resolution
  • Brief management on status and metrics
  • Mentor junior staff in incident handling
  • Perform investigations using various analytical tools
General Dynamics Information Technology logo
General Dynamics Information Technology Aerospace & Defense XLarge https://www.gdit.com/
10001 Employees
See more General Dynamics Information Technology offers

Job description

Type of Requisition:

Regular

Clearance Level Must Currently Possess:

None

Clearance Level Must Be Able to Obtain:

None

Suitability:

Public Trust/Other Required:

None

Job Family:

Cyber Security

Job Qualifications:

Skills:

Cyber Defense, Incident Handling, Incident Response

Certifications:

None - N/A

Experience:

7 + years of related experience

US Citizenship Required:

Yes

Job Description:

We are seeking a highly motivated team member to fill the role of an Incident Response Team Lead.  This is a 100% remote position.

  • Coordinates and leads an incident response team to ensure an incident is effectively managed from detection to resolution for a federal agency security operations center.
  • Serves as highest point of escalation for complex incidents.
  • Briefs federal and internal management and stakeholders on the status of an incident; produces after action reports and additional metrics as requested.
  • Mentors junior analysts in standardized incident handling processes.
  • Performs triage, investigation, and closure of incident tickets. As part of the triage and investigation processes, the individual will use various tools to determine the validity, cause, and extent of reported security incidents.  Tools include intrusion detection and various threat analytics tools.
  • Provides knowledge and expertise in tools, techniques, countermeasures, and trends in computer and network vulnerabilities and threats.
  • Assists with creation of playbooks and standard operating procedures.
  • Participates in rotating on call schedule for after-hours alerts/incidents.
  • Investigates notable events from Splunk and Microsoft 365 Defender.

Required Qualifications:

  • BS or equivalent + 7 years related experience, or MS + 5 years related experience.
  • Must have CompTIA Security+ , CompTIA Cyber Security Analyst+or equivalent.
  • Excellent written and verbal communication skills.
  • Ability to communicate effectively with stakeholders of various technical knowledge and managerial levels.
  • Hands-on experience with a SIEM, performing searches and reviewing log sources.
  • Must have recent hands-on experience with incident response life cycles including analysis, containment, eradication, recovery, and post incident activities.
  • Must be a motivated, self-starter with a passion to learn and willingness to assist other team members as needed.
  • Must be technical, quick learner, detailed oriented, independent, resourceful, and with an analytical mindset.
  • Requires ability to pass a Public Trust suitability determination investigation. Preference will be made to individuals with a current or recent security clearance or Public Trust investigation.
  • Proximity to Raleigh NC

Preferred Qualifications:

  • Experience using: Microsoft Security Defender Advanced Threat Protection, Microsoft Office 365, Microsoft Azure AD and Microsoft Cloud App Security.
  • Experience in open-source tools for the use in investigating malware incidents.
  • Experience using ServiceNow service management/ticketing system
  • Experience using Splunk Enterprise Security
  • Prior performing incident response in support of a federal government agency is desirable.
  • Microsoft, Splunk certifications, GIAC Certified Incident Handler (GCIH), EC-Council Certified Incident Handler (ECIH), EC-Council Certified Ethical Hacker (CEH) or other senior level certifications are highly desirable. 
  • Experience with creating Splunk content, dashboards, reports, and tuning existing alerts highly desired.
  • PowerShell, Python, etc. scripting experience is nice to have.
  • Network Packet capture (PCAP), report writing, remote forensics, Splunk UBA and Splunk SOAR experiences are nice to have.

The likely salary range for this position is $127,500 - $172,500. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this range.

Scheduled Weekly Hours:

40

Travel Required:

None

Telecommuting Options:

Onsite

Work Location:

USA NC Triangle

Additional Work Locations:

Total Rewards at GDIT:

Our benefits package for all US-based employees includes a variety of medical plan options, some with Health Savings Accounts, dental plan options, a vision plan, and a 401(k) plan offering the ability to contribute both pre and post-tax dollars up to the IRS annual limits and receive a company match. To encourage work/life balance, GDIT offers employees full flex work weeks where possible and a variety of paid time off plans, including vacation, sick and personal time, holidays, paid parental, military, bereavement and jury duty leave. To ensure our employees are able to protect their income, other offerings such as short and long-term disability benefits, life, accidental death and dismemberment, personal accident, critical illness and business travel and accident insurance are provided or available. We regularly review our Total Rewards package to ensure our offerings are competitive and reflect what our employees have told us they value most.

We are GDIT. A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U.S. government, defense and intelligence community. Our 30,000 experts extract the power of technology to create immediate value and deliver solutions at the edge of innovation. We operate across 30 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to create a safer, smarter world by harnessing the power of deep expertise and advanced technology.

We connect people with the most impactful client missions, creating an unparalleled work experience that allows them to see their impact every day. We create opportunities for our people to lead and learn simultaneously. From securing our nation’s most sensitive systems, to enabling digital transformation and cloud adoption, our people are the ones who make change real.

GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.

Required profile

Experience

Level of experience: Senior (5-10 years)
Industry :
Aerospace & Defense
Spoken language(s):
English
Check out the description to know which languages are mandatory.

Other Skills

  • Problem Solving
  • Team Leadership
  • Communication
  • Resourcefulness
  • Analytical Thinking
  • Detail Oriented

Incident Response Analyst Related jobs