Incident Manager - III
Company: Farfield Systems
Location: Arlington
Posted on: May 20, 2023
|
|
Job Description:
Farfield will assist the Federal staff within the Cybersecurity
and Infrastructure Protection Agency (CISA) Hunt and Incident
Response Team (HIRT), and National Cybersecurity and Assessment and
Technical Services (NCATS) branches, with a broad set of support
functions.The Hunt and Incident Response Team is DHS's front line
when responding to cyber incidents and proactively hunting for
malicious cyber activity. HIRT leverages world-class expertise to
lead response, containment, remediation, and asset recovery efforts
with its constituents and partners. HIRT provides two primary
functions to its customer. First, HIRT serves as DHS's primary
operations arm in the execution of the asset response mission
delegated to DHS.
When any civilian Government agency or critical asset owner
operator experiences a cyber-attack, HIRT can provide remote and
onsite advanced technical assistance. Second, HIRT also can be
called upon to proactively identify malicious activity, otherwise
known as a "hunt", specifically focusing on identifying threats
from sophisticated threat actors that are often undetected, and in
situations beyond the capacity and capability of traditional cyber
security tools and techniques.*** Requires a Top Secret/SCI
Clearance and U.S. Citizenship***Responsibilities:
- Correlating incident data to identify specific trends in reported
incidents -
- Recommending defense in depth principles and practices (i.e.
Defense in Multiple Places, layered defenses, security robustness,
etc.) -
- Performing Computer Network Defense incident triage to include
determining scope, urgency, and potential impact -
- Researching and compiling known resolution steps or workarounds
to enable mitigation of potential Computer Network Defense
incidents within the enterprise -
- Applying cybersecurity concepts to the detection and defense of
intrusions into small, and large-scale IT networks, and conduct
cursory analysis of log data
- Monitoring external data sources to maintain currency of Computer
Network Defense threat condition and determine which security
issues may have an impact on the enterprise -
- Identifying the cause of an incident and recognizing the key
elements to ask external entities when learning the background and
potential infection vector of an incident, -
- Receiving and analyzing network alerts from various sources
within the enterprise and determine possible causes of such alerts
-
- Tracking and documenting Computer Network Defense (CND) incidents
from initial detection through final resolution, and work with
other components within the organization to obtain and coordinate
information pertaining to ongoing incidents
- Providing support during assigned shifts (Monday through Friday,
normal business hours)Required Skills:
- U.S. Citizenship
- Must have an active TS/SCI clearance
- Must be able to obtain DHS Suitability
- 5+ years of directly relevant experience in cyber incident
management or cybersecurity operations
- Knowledge of incident response and handling methodologies
- Having close familiarity with NIST 800-62 (latest revision),
FISMA standards as they pertain to reporting incidents, and MITRE
ATT&CK framework
- Knowledge of the NCCIC National Cyber Incident Scoring System to
be able to prioritize triaging of incident
- Knowledge of general attack stages (e.g., foot printing and
scanning, enumeration, gaining access, escalation of privileges,
maintaining access, network exploitation, covering tracks,
etc.)
- Skill in recognizing and categorizing of various types of
vulnerabilities and associated attacks
- Knowledge of intelligence community reporting, classified
information handling requirements, and critical infrastructure
designations
- Knowledge of different operational threat environments (e.g.,
first generation [script kiddies], second generation [non
nation-state sponsored], and third generation [nation-state
sponsored])
- Knowledge of system and application security threats and
vulnerabilities (e.g., buffer overflow, mobile code, cross-site
scripting, PL/SQL and injections, race conditions, covert channel,
replay, return- oriented attacks, and malicious code)Desired
Skills:
- Knowledge of different operational threat environments (e.g.,
first generation [script kiddies], second generation [non
nation-state sponsored], and third generation [nation-state
sponsored])
- Knowledge of system and application security threats and
vulnerabilities (e.g., buffer overflow, mobile code, cross-site
scripting, PL/SQL and injections, race conditions, covert channel,
replay, return- oriented attacks, and malicious code)Required
Education:
BS Incident Management, Operations Management, Cybersecurity or
related degree. -HS Diploma with 7-9 incident management or cyber
security experienceDesired Certifications:
GCIH, GCFA GISP, GCED, CCFP or CISSPPowered by JazzHR
Keywords: Farfield Systems, Arlington , Incident Manager - III, Executive , Arlington, Virginia
Click
here to apply!
|