Cyber Watch Developmental

 

Up to $86,000 working in the Chantilly, Herndon or Reston areas

 

The Cyber Watch Developmental position is working on a 12-hour shift with varying schedules per week

 

Solid stable disruptive technology firm with Federal and Commercial business is seeking qualified engineers with hands-on expertise across COTS, GOTS, and open source technologies, who possess the requisite security clearances to join our growing organization.

 

As the recent awardee of a five-year program delivering premier system engineering support to a Federal Government customer, this small, technology practitioner is looking for multiple candidates across all experience levels that fit with our customer first culture and a passion for solving hard problems with technologies.

 

This technology practitioner seeks candidates eager to join an organization that values outcomes over process and tenaciously seeks out the best idea or solution for their customer in a collaborative environment.

 

Do you want to be part of something substantive and growing?

Do you want to be with a firm where the best idea wins, not the most senior idea?

Do you wanted to be empowered to support customers and treated like an adult?

 

If you answered yes, then this is the opportunity for you!

 

This visionary award-winning Federal and commercial consulting firm founded in 2009, provides subject matter expertise and tailored engineering solutions to over 200 Federal and Commercial clients and has successfully completed over 900 engagements is looking for multiple candidates within four distinct experience levels of Senior Cyber Analyst to help continue to build a great reputation.

 

 

You will install, support, maintain and monitor IT Storage Area Network (SAN) infrastructure for reliability and uptime. Architects, designs, implements and maintains complex enterprise SANs and data backup recovery systems. In collaboration with other architecture and engineering teams (systems engineering, database administration, network operations and applications development), analyze and design enterprise storage systems used for customer data management, high transaction database processing and storage. Working with others, analyze and translate business requirements into a solution design for new installations or upgrades to existing platforms. Manages and provides operational support of data availability and retention systems such as server and SAN based backups and enterprise level backup solutions.

 

You will work a 12-hour shift on the Computer Incident Response Team (CIRT) Watch Floor with varying schedules by week.

 

You will collaborate between CIRT elements as necessary during incident detection and response stages.  Respond promptly to all request for support whether telephonic, via e-mail or instant messenger. Create releasable finished intelligence products and reports for the IC as well as IC Senior Leadership. Maintain incident case management database for all reported incidents. Analyze incidents and events captured in the Case Management Database for trends, patterns, or actionable information. Review incidents and events captured in the Case Management Database after closure for investigative sufficiency and timeliness. Leverage existing business processes and where necessary define and document new repeatable business processes and procedures. Research external information on events, incidents, outages, threats, and technical vulnerabilities. Coordinate and disseminate the best course of action for the IC enterprise during cybersecurity events, incidents, outages, threats and technical vulnerabilities with IC-IRC fusion analysis team. Assess incidents to identify type of attack, estimate impact, and collect evidence

 

Required Qualifications are a Bachelor’s in Cybersecurity, Information Security, Information Technology, Computer Science/Engineering, Network Engineering, or Computer forensics OR Instead of a Bachelor’s Degree a minimum of 4 years of experience in Cybersecurity, Information Security, Information Assurance, and Information Technology, Electrical Engineering, Network Engineering, Computer Science/Engineering, Computer Forensics, or related technical field. Experience used as equivalency for college degree must be in addition to other experience requirements.

A minimum of 1-year experience with in 3 or more of the following: technical analysis, network engineering, network security, and offensive experience, technical collection, penetration testing, “red teaming” and computer exploitation.

A minimum of 6 months experience working with Security incident and event management

A minimum of 6 months experience working within a Security or Network Operations Center

A proficient in at least one of the following tools/techniques: HP Openview, FireEye, Solar Winds, ArcSight, Web Sense.

 

Desired Qualifications are CISSP, CCFP, CCSP, CEH, GCFS, GCIA

 

Competitive salary up to $86,000 with incredible benefits that include Medical, dental, vision, life insurance, STD/LTD, 401K, tuition aid, bonuses and over 5 weeks of PTO.