Jr. Incident Response Analyst & Media Forensics Analyst Job - Military veterans preferred

2018-11-12
SAIC (www.saic.com)
Other

/yr

  full-time   employee


Santa Ana
California
United States

Jr. Incident Response Analyst & Media Forensics Analyst (Job Number:439729)

Description:

JOB DESCRIPTION:
This position will be responsible for incident response for the 24/7 Security Operations Center (SOC). The candidate must have one year of professional experience in performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis. Additionally, they will have a minimum of one year of professional experience responding to information system security incidents and an ability to use the common industry security toolsets to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities in a network security environment, such as a Security Operations Center (SOC), Computer Emergency Response Team (CERT), Computer Incident Response Team (CIRT), Computer Incident Response Center (CIRC) or Cyber Security Incident Response Center (CSIRC). Job Specific Responsibilities:

- Develop moderately complex security designs and test plans using existing technology.
- Perform and document root cause analysis for security incidents.
- Perform and document all aspects of Digital Media Forensics Analysis using forensics tools (EnCase Forensic).
- Work closely with the SAIC CISO to identify and recommend process and system improvements to the security program.
- Create relevant documentation and recommendations for changes to the current security architecture.
- Drive the capabilities and execution to effectively optimize and improve enterprise security.
- Demonstrate expert level knowledge of security services and implementations.
- Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers.
- Document and escalate appropriate events and incidents to Tier 3 engineer.
- Examine cyber adversary techniques in order to develop defensive methodologies.
- Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC.
- Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives.
- Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected.
- Perform analyses to validate established security requirements and to recommend additional security requirements and safeguards.
- Work with the SAIC CISO to develop a metrics program to report on overall SOC performance and effectiveness.
VENDORS/TOOLS/MANAGEMENT SYSTEMS

- Wireshark
- LogRhythm
- ServiceNow
- Keylight
- Nessus
- Microsoft Exchange and Microsoft Exchange Online Protection
- Sourcefire
- Blue Coat
- Zscaler
- McAfee Data Loss Prevention
- EnCase Forensic

Qualifications:

TYPICAL EDUCATION AND EXPERIENCE:

- Bachelors and two (2) years or more experience; Masters and 0 years related experience.

CLEARANCE REQUIREMENT:

- Must be able to pass a California Department of Justice (DoJ) LiveScan background investigation and a detailed lifestyle law enforcement background interview.

REQUIRED QUALIFICATIONS & EXPERIENCE

- Bachelor degree in Computer Science, Engineering, Information Technology, Cybersecurity or related field and a minimum of one year of experience in Cyber Security.
- Demonstrated Experience with Cyber Security E-mail and Incident Response including expert experience in at least two of the following areas:
- (a) Vulnerability Assessment;
- (b) Intrusion Prevention and Detection;
- (c) Access Control and Authorization;
- (d) Policy Enforcement;
- (e) Application Security;
- (f) Protocol Analysis;
- (g) Firewall Management;
- (h) Incident Response;
- (i) Encryption;
- (j) Web?filtering;
- (k) Advanced Threat Protection

KEY REQUIREMENTS

- Security+ and/or CySA, plus CCNA Certification,
- Experience with Security Information and Event Management Tools (LogRhythm).
- Experience using digital media forensic tools (EnCase Forensic).
- Experience performing digital media forensic analysis, static malware code disassembly and analysis, and runtime malware code analysis.
- Experience writing moderately complex scripts.
- Understanding of networking concepts and technologies including TCP/IP, Routing, Switching, NAT, OSI Model, etc.
- Ability to manage multiple projects and multiple deadlines in an organized fashion.
- Understanding of advanced data analysis and management concepts.
- Technical writing abilities to author technical and management risk reports.
- Develop cyber security analytics and threat intelligence using multiple data sources provided to the Security Information and Event Management (SIEM) system.
- Work closely with the SAIC CISO to identify and recommend process and system improvements to the security program.
- Create relevant documentation and recommendations for changes to the current security architecture.
- Drive the capabilities and execution to effectively optimize and improve enterprise security.
- Demonstrate expert level knowledge of security services and implementations.
- Investigate, positively identify, and document anomalous events and incidents that are escalated by Tier 1 engineers.
- Document and escalate appropriate events and incidents to Tier 3 engineer.
- Examine cyber adversary techniques in order to develop defensive methodologies.
- Conduct risk analysis and convert it into actionable monitoring recommendations to be conducted by the SOC.
- Recommend remediation and mitigation strategies and implementations based on the results of vulnerability assessments, to ensure effective achievement of the organizational objectives.
- Provide support for security incidents throughout the incident lifecycle as needed and make recommendations to ensure enterprise infrastructure is protected.
- Performs analyses to validate established security requirements and to recommend additional security requirements and safeguards.
- Work with the SAIC CISO to develop a metrics program to report on overall SOC performance and effectiveness.
DESIRED QUALIFICATIONS & EXPERIENCE

- Certified Information Systems Security Professional (CISSP)
- Experience in Information Assurance Policy and Guidelines
- NIST Special Publication 800-53
- NIST Cybersecurity Framework
- ITILĀ® Foundation Level or higher Certification

SAIC Overview:SAIC is a premier technology integrator providing full life cycle services and solutions in the technical, engineering, intelligence, and enterprise information technology markets. SAIC is Redefining Ingenuity through its deep customer and domain knowledge to enable the delivery of systems engineering and integration offerings for large, complex projects. SAIC's approximately 15,000 employees are driven by integrity and mission focus to serve customers in the U.S. federal government. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $4.5 billion. For more information, visit saic.com. For information on the benefits SAIC offers, see My SAIC Benefits. EOE AA M/F/Vet/Disability

Job Posting: Sep 4, 2018, 8:50:08 AM
Primary Location: United States-CA-SANTA ANA
Clearance Level Must Currently Possess: None
Clearance Level Must Be Able to Obtain: Secret
Potential for Teleworking: No
Travel: None
Shift: Day Job
Schedule: Full-time