LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
This role is in anticipation of funded work. You will provide CSOC Tier 2 services, which is 24x7x365 coordination, execution, and implementation of all actions required for the containment, eradication, and recovery measures for events and incidents. CSOC Tier 2 services includes malware and implant analysis, and forensic artifact handling and analysis. While not in a period of incident response, you will conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber-incident.
More about your role:
Malware and implant analysis, and forensic artifact handling and analysis. While not in a period of incident response, you will conduct continuous exercises and dry runs to improve response outcomes in the event of a cyber incident.
Coordinate and implement tasks, performing analysis, and building/documenting response activities required during cyber security incident response, to include but not limited to actions such as implementing containment measures, IP blocks, domain blocks, and disabling user accounts on direction of the Government
Coordinate with Security and Installations Directorate (SI) Office of Counterintelligence (SIC), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform advanced investigation and triage of incidents
Collaborate with appropriate authorities in the production of security incident reports
Categorize incidents and events
Coordinate with other contracts, organizations, activities, and other services as appropriate to ensure incidents are properly reported, contained, and eradicated
Coordinate with other contracts, organizations, activities, and other services as appropriate to de-conflict blue / red team activity with open incidents/event and to ensure NGA recovers from an incident/event
Build timelines, documents, briefings, and other products as required to inform stakeholders of incident response actions, analysis, and the impact of both adversary activity and blue force response actions
Document actions taken and analysis in the authorized ticketing system to a level of detail where the actions taken and analysis are capable of being systematically reconstructed
Develop and when approved by the Government generates and updates reports in the Joint Incident Management System (JIMS), Incident Case Management System (ICMS), and/or other authorized reporting systems as directed
Develop, maintain, sustain, and when properly authorized by the Government execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events
Perform digital media analysis on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis
Develop and identify indicators of compromise to send to Cybersecurity stakeholders and other Contract Services
Provide adversary attribution
Perform malware analysis and signature development
Provide input to and coordinates with all applicable stakeholders to develop and deliver the daily CSOC Significant Activity Report, the daily CSOC Operations Update, and the Weekly CSOC Status Report
Serve as C-IRT members as required and serve under the direct control of, and take direction from, the Government C-IRT Commander
Develop and coordinate courses of action with various Government and contract stakeholders, and when properly authorized by the Government, execute Defensive Cyberspace Operations-Internal Defensive Measures on behalf of the NGA on NGA networks and systems
Perform digital media analysis and malware reverse engineering on host, server, and network data as required to analyze and respond to an incident, to include but not limited to volatile and non-volatile memory and/or system artifact collection and analysis
When properly authorized by the Government, execute custom scripts, tools, and capabilities to collect and analyze data, and to respond to incidents/events
Develop, document, and provide to the Government incident investigation reports which include sufficient information to document the entire lifecycle of the incident and the response, including but not limited to adversary and friendly forces activity, host and network analysis, timelines, and recommendations for corrective actions, recommendations for new Tactics, Techniques, and Procedures (TTP) and other recommendations as appropriate, within 30 days of C-IRT stand-down
Conduct Quality Control reviews of a percentage closed CSOC Tier 2 tickets each week to ensure proper analysis, categorization, documentation, and notification;
You’ll Bring These Qualifications:
Must be a US Citizen with an Active TS/SCI to start work but required to obtain a CI Poly within 6 months.
Typically has a University Degree (BA/BS) or equivalent experience and minimum 4 years of related work experience
All Contractor personnel performing CSOC Tier 2 services shall have a certification that is compliant with DoD 8140.01 and DoD 8570.01-M IAT Level II and CSSP Analyst Certification
5+ years of related CSOC tier 2 or 3 work experience
Additional Information
All your information will be kept confidential according to EEO guidelines.
Compensation is unique to each candidate and relative to the skills and experience they bring to the position. The salary range for this position is typically $90-95k. This does not guarantee a specific salary as compensation is based upon multiple factors such as education, experience, certifications, and other requirements, and may fall outside of the above-stated range.
Highlights of our benefits include Health/Dental/Vision, 401(k) match, Accrued PTO, STD/LTD/Life Insurance, Referral Bonuses, professional development reimbursement, and more!
D2 Consulting is committed to a merit-based recruitment process and encourages applications from all qualified individuals. As a Veteran-Owned Small Business, we particularly welcome applications from veterans who have the requisite skills and experience. Job applicants that are interested in one of our openings and may require a reasonable accommodation to participate in the job application or interview process, should contact us to request an accommodation.
Seniority level
Mid-Senior level
Employment type
Full-time
Job function
Engineering and Information Technology
Industries
Construction, Software Development, and IT Services and IT Consulting
Referrals increase your chances of interviewing at D2 Consulting by 2x