Are you ready to join SAIC and our USMC team at MARFORCYBER? The team has a mission to support the United States Marine Corps conducting full-spectrum military cyberspace operations in order to enable actions in all domains, and will insure US/Allied freedom of action in cyberspace and deny the same to our adversaries. This opportunity is on the front line of Cyber offense, defense and DoDIN operations!
The Incident Response Handler must be a proven team player with excellent oral and written communications skills. The Incident Response Handler must be capable of working on projects independently. Frequent interaction with government client is required. Candidate must have previous experience working in a network security incident response team, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC). The Incident Response Handler provides continuous monitoring of cyber space operations within the MARFORCYBER Command Operations Center (COC). Perform Cyber Incident response in accordance with MARFORCYBER COC SOPs, threat and vulnerability assessment, analyze networks events detected by network monitoring systems and coordinate responses, and participates in meetings with other cyber organizations including service components, Intelligence agencies, law enforcement, etc. Respond to incidents within the defined response times by the Help Desk Operations.
TYPICAL EDUCATION AND EXPERIENCE: Bachelors and nine (9) years or more experience; Masters and seven (7) years or more experience ; PhD or JD and four (4) years or more experience.
BS Degree in Computer Science
10 years of recent work experience in incident response
IAM Level III certification
Experience performing computer network defense (CND) incident triage
Experience identifying the specific vulnerability; and making recommendations that enable expeditious remediation
Experience performing initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems
Experience performing real-time computer network defense (CND) incident handling (e.g., forensic collections, intrusion correlation/tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs)
Experience analyzing network alerts from various sources within the enterprise and determine possible causes of such alerts
Experience tracking and documenting computer network defense (CND) incidents from initial detection through final resolution
Experience employing approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness), collect intrusion artifacts (e.g., source code, malware, and trojans) and use discovered data to enable mitigation of potential computer network defense (CND) incidents within the enterprise
Must currently possess a TS/SCI Clearance
SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC provides systems engineering and integration offerings for large, complex projects. Headquartered in McLean, Virginia, SAIC has approximately 15,000 employees and annual revenues of about $4.3 billion.
EOE AA M/F/Vet/Disability
Primary Location: United States-VA-STAFFORD
Clearance Level Must Currently Possess: Top Secret/SCI
Clearance Level Must Be Able to Obtain: Top Secret/SCI
Potential for Teleworking: No
Shift: Day Job
Nearest Major Market: Richmond
Job Segment: Network, Defense, Engineer, Military Intelligence, Computer Science, Technology, Government, Engineering