Lead Cyber Incident Response Analyst

Washington, District of Columbia, United States

Applications have closed

phia LLC

At phia, trust us to solve the complex challenges of our connected world through top-tier cyber intelligence & threat hunting. Contact us.

View company page

At phia, we hire talented and passionate people who are focused on collaborative, meaningful work, providing technical and operational subject matter expertise and support services to our partners and clients.

We are hiring a Lead Cyber Incident Response Analyst to join us supporting a federal customer. This position is primarily remote, with occasional work at a customer location in Washington, DC.

What You'll Do

  • Act as a team lead providing cyber incident response (IR) & analysis services for a complex enterprise with many locations and partner interconnections.
  • Leverage a wide range of both network (netflow, packet capture, signature-based alerts, and logs), endpoint (EDR, operating system and application/server logs – across workstation/server/mobile devices) and cloud platform data sources for threat identification, investigation, and response.
  • Plan, coordinate, and lead incident response activities, including acting as a technical subject matter expert for all forms of analysis.
  • Assist in managing IR engagements and communicating with customers and stakeholders.
  • Recommend and implement tactical mitigation actions.
  • Formulate strategic recovery recommendations and plans.
  • Develop final engagement reports and brief senior officials.

Requirements

Education + Experience

  • Must have 8+ years’ experience in a security operations technical role
  • Experience handling and responding to cyber Advanced Persistent Threats (APT) and/or intrusions in the Financial (FIN) sector
  • Experienced leading IR efforts and briefing senior leaders
  • Bachelor's, Master's, or Ph.D. Computer Science, Cybersecurity, Computer Engineering, Information Technology, Software Engineering, Information Systems, or similar (preferred)
  • Must submit a writing sample prior to approval

Desired

  • Bachelor's degree in Computer Science, Information Technology, Information Security, or a related field.

Required Certifications

One of the following

  • GCIH, GCIA, GCFE, or GCFA

Desired Skills and Qualifications

  • Other relevant certifications include: GIAC Certified Incident Handler (GCIH), GIAC Certified Detection Analyst (GCDA), GIAC Certified Forensic Analyst (GCFA), and other GIAC certifications focused on security operations, analysis, response and forensics.
  • Experience with the Trellix (FireEye) suite of tools
  • Experience applying MITRE ATT&K and Kill Chain™ frameworks to cyber analysis and incident response methodologies
  • Advanced knowledge of security concepts, protocols, processes, architectures, and tools (vulnerabilities, threats and exploitation, authentication & access control technologies, threat intelligence data and sources, intrusion detection/prevention capabilities, network protocols & traffic analysis, SIM & SOAR capabilities, incident handling & response, forensic media capture & analysis, malware analysis, etc).
  • Familiarity of cyber policy and privacy issues, and their implications for cyber incident response.
  • Familiarity with popular cyber products and services, including understanding of their strengths and limitations.
  • Comfort operating across a wide variety of operating systems, virtualization technologies and cloud platforms.
  • Some level of proficiency with lightweight programing / scripting for analysis automation.
  • Ability to produce results in a fast-paced environment with the ability to meet iterative deadlines.

Security Clearance

  • This requires U.S. citizenship and eligibility for Public Trust

Who You Are

  • A proactive problem solver that appreciates the challenges of working in a fast-paced, dynamic environment.
  • Intellectually curious with a genuine desire to learn and advance your career.
  • An effective communicator, both verbally and in writing.
  • Customer service oriented and mission focused.
  • Critical thinker with excellent problem-solving skills.

If your experience and qualifications aren’t a match for this position, you will remain in our database for consideration for future opportunities that may be a better fit.

IMPORTANT: This position may be subject to Executive Order 14042 and the Safer Federal Workforce Task Force Guidance requiring covered employees to be fully vaccinated against COVID-19, which the Federal Government is not enforcing at this time.

Benefits

Who We Are

phia LLC ("phia") is a Northern Virginia based, 8a certified small business established in 2011 with focus in Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security. we proudly support various agencies and offices within the Department of Defense (DoD), Federal government, and private/commercial entities.

phia values work-life balance and offers the following benefits to full-time employees:

  • Comprehensive medical insurance to include dental and vision
  • Short Term & Long-Term Disability
  • 401k Retirement Savings Plan with Company Match
  • Tuition and Professional Development Assistance
  • Flex Spending Accounts (FSA)

phia does not discriminate on the basis of race, sex, color, religion, age, national origin, marital status, disability, veteran status, genetic information, sexual orientation, gender identity or any other reason prohibited by law in provision of employment opportunities and benefits.

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Tags: APT Automation Clearance Cloud Computer Science DoD EDR Forensics GCFA GCIA GCIH GIAC Incident response Intrusion detection Malware Privacy Scripting Security Clearance SOAR Strategy Threat intelligence Vulnerabilities

Perks/benefits: 401(k) matching Career development Health care Insurance

Region: North America
Country: United States
Job stats:  2  0  0

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.