Overview

Cyber Incident Management Analyst – Hybrid Jobs in Sterling, Virginia, USA at Nightwing

Title: Cyber Incident Management Analyst – Hybrid

Company: Nightwing

Location: Sterling, Virginia, USA

Type: Full Time

Category: IT/Tech, Security

Position: (Cyber) Incident Management Analyst – Hybrid

Location: Sterling

Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers’ most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.

Nightwing is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Cyber Incident Management Analyst to support this critical customer mission.

Responsibilities:

Managing reported incidents by providing a single point of service for incident customer organizations throughout the incident life cycle of a high priority incident.

Correlating incident data to identify specific trends in reported incidents.

Recommending defense in depth principles and practices (i.e. Defense in Multiple Places, layered defenses, security robustness, etc.).

Performing Computer Network Defense incident triage to include determining scope, urgency, and potential impact.

Identifying the specific vulnerability and making recommendations that enable expeditious remediation.

Assisting Federal leads with incident management functions when deployed at an onsite engagement.

Assisting in coordinating with private sector partners, law enforcement, and internal entities to conduct daily operations.

Conducting peer reviews and providingquality assurancereviews for junior personnel.

Mentoring junior incident managers and providing guidance to others on incident management prioritization, triage and report writing in support of onsite engagements.

Providingteam leadershipduring assigned shifts (2:00 PM – 10:30 PM ET or 10:00 PM – 6:30 AM ET and 12 hour weekend shifts).

Leading a technical team of up to 6 highly skilled cyber threat analysts.

Required Skills:

U.S. Citizenship.

Must have an active TS/SCI clearance.

Must be able to obtain DHS Suitability.

8+ years of directly relevant experience in cyber incident management or cybersecurity operations.

Knowledge of incident response and handling methodologies.

Knowledge of the NCCIC National Cyber Incident Scoring System to prioritize triaging of incidents.

Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.).

Demonstrated experience with recognizing and categorizing types of vulnerabilities and associated attacks.

Knowledge of basic system administration and operating system hardening techniques.

Knowledge of Computer Network Defense policies, procedures, and regulations.

Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]).

Knowledge of system and application secur…

 

Upload your CV/resume or any other relevant file. Max. file size: 800 MB.