Skip to Main Content

Tier II Incident Response - Night Shift

Warriors Recruiting
Ashburn, VA
  • Expired: over a month ago. Applications are no longer accepted.
Job Description

Title: Tier II Incident Response - Night Shift

Location: Ashburn, VA – Full remote for next few months.

Shift Schedule: 7pm-7am, Thur-Sat, every other Wednesday. (Other shifts possibly available)

Company Description

Our great client is a solutions oriented, problem-solving, and veteran driven Service Disabled Veteran Owned Small business specializing in project management, solutions engineering, information assurance, computer network operations and cyber security operations in support of the federal, state and local government organizations. Employing professional, knowledgeable and experienced personnel, we strive to provide superior service and exceptional results to our customers.

Program Description:

The CBP SOC is composed of a elite team of computer security analysts is hard at work protecting CBP's computer networks and sensitive information. The Security Operations Center, known as the SOC, is part of CBP's Office of Information and Technology. The team operates 24 hours a day, seven days a week to ensure that information technology security policy and controls are followed throughout CBP and other DHS components. In this way the SOC analysts are the frontline of defense for the department's information and IT resources.

Job Description :

  • Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
  • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
  • Lead Incident Response activities and mentor junior SOC staff.
  • Work with key stakeholders to implement remediation plans in response to incidents.
  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
  • Flexible and adaptable self-starter with strong relationship-building skills
  • Strong problem solving abilities with an analytic and qualitative eye for reasoning
  • Ability to independently prioritize and complete multiple tasks with little to no supervision

Certification requirement (Must have one):

GCIH – Incident Handler
GCFA – Forensic Analyst
GCFE – Forensic Examiner
GREM – Reverse Engineering Malware
GISF – Security Fundamentals
GXPN – Exploit Researcher and Advanced Penetration Tester
GWEB – Web Application Defender
GNFA – Network Forensic Analyst
OSCP (Certified Professional)
OSCE (Certified Expert)
OSWP (Wireless Professional)
OSEE (Exploitation Expert)
CCFP – Certified Cyber Forensics Professional
CISSP – Certified Information Systems Security
CCNA Security
CCNP Security
CEH – Certified Ethical Hacker
CHFI – Computer Hacking Forensic Investigator
LPT – Licensed Penetration Tester
ECSA – EC-Council Certified Security Analyst
ENSA – EC-Council Network Security Administrator
ECIH – EC-Council Certified Incident Handler
ECSS – EC-Council Certified Security Specialist
ECES – EC-Council Certified Encryption Specialist
Windows Forensic Examinations – FTK WFE-FTK
Computer Incident Responders Course - CIRC
Windows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CI
Forensics and Intrusions in a Windows Environment -FIWE

Warriors Recruiting


Ashburn, VA



View all jobs at Warriors Recruiting