Experienced Cybersecurity Incident Response Handler and Analyst - 3rd Shift - ONSITE/REMOTE - Washington DC - Federal Agency Support
Introduction to Visual Soft, Inc.
Visual Soft, Inc. is a leading provider of cybersecurity solutions, dedicated to protecting federal agencies and their networks from ever-evolving cyber threats. As a trusted partner, we are seeking a highly skilled and experienced Cybersecurity Incident Response Handler and Analyst to join our team in supporting a federal agency's enterprise Security Operations Center (SOC). If you are a motivated and inquisitive cybersecurity professional with a passion for incident response, we encourage you to apply for this exciting opportunity.
Job Overview
We are looking for a talented Cybersecurity Incident Response Handler and Analyst to work on our efforts with a Prime for their end customer, a federal agency. As an Incident Response Handler and Analyst, you will play a critical role in responding to and mitigating cyber threats affecting the client's networks. This is a unique opportunity to work on a high-profile project, collaborating with a team of experienced cybersecurity professionals to protect the nation's critical infrastructure.
Key Responsibilities:
- Respond to cyber incidents, including responding to SOC IR phone calls and SOC emails from the client and customer POCs.
- Provide support in the detection, response, mitigation, and reporting of cyber threats affecting internal and external clients' networks.
- Maintain an understanding of current vulnerabilities, response, and mitigation strategies used in the cybersecurity operation center.
- Develop documentation, reports, briefs, and review SOPs with customers to give an accurate depiction of the current threat landscape and associated risk affecting the clients' networks.
- Provide analysis for correlated information sources to the client, notified by the Cyber SOC Team Lead or the Government Watch Officer.
- Act as a Subject Matter Expert in investigations for potential incidents at the SOC Tier 1 Level.
- Analyze and report cyber threats, as well as assist in deterring, identifying, monitoring, investigating, and analyzing computer network intrusions.
- Work with SOC federal staff, Shift Lead, Senior Analyst to analyze, triage, contain, and remediate security incidents.
- Follow Federal IRP, SOC SOPs, and other prudent documentation procedures to work effectively while having an eye towards process improvement and efficiency.
Essential Qualifications:
To be successful in this role, you should have:
- 3 years of security operations center (SOC) experience, with a focus on incident response and cybersecurity.
- U.S. Citizenship is required.
- A Bachelor's degree is preferred but not required.
- Experience with multiple technology and system types, including wide area networks, host and network IPS/IDS/HIPS, traffic event review, server web log analysis, and raw data logs.
- Knowledge of multiple attack types and attack vectors, including experience with forensic investigation of emails for phishing campaigns, spam emails, and malware analysis.
- Experience utilizing Splunk SIEM, writing and creating Splunk Search Processing Language (SPL), creating and running queries, and performing analytics examination of logs and console events.
- Experience tracking incidents against a framework such as MITRE ATT&CK or Cyber Kill Chain methodology.
- Familiarity with multiple vendor technologies, such as Azure Sentinel, Microsoft 365 Security Center, FireEye (Trellix) suite of products, Domain Tools, Industry name Firewall/IPS, and OSINT tools.
- Experience using Helpdesk ticket capturing tools such as HEAT & ServiceNow.
Preferred Qualifications:
While not required, the following qualifications are highly desirable:
- Certifications in cybersecurity, such as CompTIA Security+ or CISSP.
- Experience working in a federal agency or government contracting environment.
- Knowledge of cloud security platforms, such as Amazon Web Services (AWS) or Microsoft Azure.
- Experience with scripting languages, such as Python or PowerShell.
- Familiarity with agile development methodologies and version control systems, such as Git.
Skills and Competencies:
To excel in this role, you should possess:
- Strong analytical and problem-solving skills, with the ability to think critically and outside the box.
- Excellent communication and interpersonal skills, with the ability to work effectively in a team environment.
- Strong attention to detail, with the ability to maintain accuracy and quality in a fast-paced environment.
- Ability to work independently, with minimal supervision, and prioritize tasks effectively.
- Strong knowledge of cybersecurity principles, threats, and vulnerabilities, with the ability to stay up-to-date with emerging trends and technologies.
Career Growth Opportunities and Learning Benefits:
At Visual Soft, Inc., we are committed to the growth and development of our employees. As a Cybersecurity Incident Response Handler and Analyst, you will have access to:
- Ongoing training and professional development opportunities, including certifications and conferences.
- Mentorship and coaching from experienced cybersecurity professionals.
- Opportunities to work on high-profile projects and collaborate with federal agencies and government contractors.
- A dynamic and supportive work environment, with a focus on teamwork and innovation.
Work Environment and Company Culture:
Our company culture is built on a foundation of integrity, respect, and trust. We value our employees and strive to create a work environment that is:
- Collaborative and inclusive, with a focus on teamwork and open communication.
- Dynamic and innovative, with a emphasis on creativity and problem-solving.
- Supportive and flexible, with a focus on work-life balance and employee well-being.
Compensation, Perks, and Benefits:
We offer a competitive salary and benefits package, including:
- 3 weeks of paid time off (PTO), including sick leave, with the option to carry over unused PTO.
- 2 floating holidays and 8 public holidays, with the option to take additional time off with manager approval.
- 50% company-paid health and dental insurance for full-time employees, with the option to add dependents at an additional cost.
- Short-term disability (STD), long-term disability (LTD), and life insurance at no cost to full-time employees.
- 401(k) program with a 4% company match, immediate vesting, and the option to contribute to a retirement savings plan.
- Profit-sharing program, with no employee contributions required.
Conclusion:
If you are a motivated and experienced cybersecurity professional looking for a challenging and rewarding role, we encourage you to apply for this opportunity. As a Cybersecurity Incident Response Handler and Analyst, you will play a critical role in protecting federal agencies and their networks from cyber threats. With a competitive salary, comprehensive benefits package, and opportunities for growth and development, this is an exciting chance to join a dynamic and supportive team. Apply now to take the first step in your career with Visual Soft, Inc.!
Apply for this job