Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
Springfield, VA – onsite
Compensation: $75,000 - $83,500 annually
Security Clearance: Secret clearance is required
DUTIES AND RESPONSIBILITIES:
• Review cyber intelligence and identify how current threats affect US BICES networks.
• Perform cyber detection and incident response activities for a large program; coordinates with government program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
• Review cyber events and document cybersecurity incidents utilizing ServiceNow.
• Produce after action reports following closure of cybersecurity incidents.
• This position will work within cybersecurity environment monitoring, analyzing, and responding to cybersecurity events and incidents not limited to; Analysis of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
• Work with vendors to ensure the DCO tool suites detect and capture required cyber incidents, to include the latest industry threats and zero-days, etc.
• Review intelligence reports and provide a daily cyber assessment on the impact to US BICES networks.
• Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations
• Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity.
• Research and develop methods of tracking and detecting malicious activity within a network
• Be available for after-hours support when required. Incident response is a vital position to respond to critical cyber-attacks, and our Enterprise is a 24/7 operation.
• Participate in daily use of threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks.
• Perform malware analysis with DCO tools.
• Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort)
• Create, modify, and tune Splunk dashboards, reports, and alerts related to real-time detection and incident response.
• Utilize available resources to conduct Cybersecurity activities, and report to senior GDIT and government personnel on overall program security posture.
• Communicate tactical and strategic threat information to Government leadership, Cybersecurity Operations Team and the Assessment & Authorization Team to assist them in making cyber risk decisions and to mitigate threats.
• Coordinate with USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, CVAs, ST&Es, and CCRI
• Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems
• Assists with implementation of countermeasures or mitigating controls.
• Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
• Work with the Information Assurance Team, Security Managers and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
• Provides guidance and work leadership to less experienced technical staff members.
• Maintains current knowledge of relevant technology as assigned.
• Participates in special projects as required.
• Provide incident detection through understanding malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.
REQUIREMENTS AND QUALIFICATIONS:
• A Junior-level person within a labor category should have three (3) or more years of experience performing work related to the labor category functional description (or functional requirement).
• Two (2) or more years of a specific functional requirement pertaining specifically to the labor category (e.g. a System Engineer must have at least two years performing duties specific to System Engineering) while the other year must pertain to a related labor category (e.g. any other engineer discipline) and a component of the DoD relating to the PWS task areas being supported.
• A Junior level person is typically responsible for assisting more senior positions and/or performing functional duties under the oversight of more senior positions.
Mandatory Skills:
• Certified Computer Security Incident Response
• Cyber Security
• Direct experience in the implementation, administration, and configuration of Trellix ePO in a global enterprise environment
• Knowledge of RMF, Trellix ePO, NESSUS, SCAP, and vulnerability scanning
• Splunk
Desired Skills:
• Experience reviewing network, host, and firewall security logs
System One, and its subsidiaries including Joulé, ALTA IT Services, and Mountain Ltd., are leaders in delivering outsourced services and workforce solutions across North America. We help clients get work done more efficiently and economically, without compromising quality. System One not only serves as a valued partner for our clients, but we offer eligible employees health and welfare benefits coverage options including medical, dental, vision, spending accounts, life insurance, voluntary plans, as well as participation in a 401(k) plan.
System One is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, age, national origin, disability, family care or medical leave status, genetic information, veteran status, marital status, or any other characteristic protected by applicable federal, state, or local law.
#M2
#DI-VH1
Ref: #850-Rockville (ALTA IT)
Key Skills
Ranked by relevanceReady to apply?
Join ALTA IT Services, LLC and take your career to the next level!
Application takes less than 5 minutes