Insider Threat Auditor ECND036
See a complete list of our open positions
Apply at the Bottom of the Page
IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community. We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.
Some of the positions are future positions. Please look at the opening line of the job description to determine if this is an open or future position.
We are looking to fill this position at the following location(s):
- Washington, DC
Insider Threat Auditor:
Performs all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
Join a team that leads in cyber with the top technical cyber talent, range of customer experience, and emerging technology to address tomorrow’s cyber threats. Our service model approach to secure, operate, and defend is predicated on ensuring the skill-set of our staff remains on the cutting edge of technology through our virtual training platform and Cyber Range.
Skill Level 4:
Skills and Tasks: Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.
Leadership/Management: May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.
Guidance: Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractor teams through to project completion.
Functional duties consist of:
Identify and manage network computer and system security events relative to fraud, waste and abuse, including content inappropriate to the workplace, Illegal Activity, Productivity Loss and Non-Compliant Activity, as well as Identity Leakage (PII).
Perform forensic analysis of digital information and gathers and handles evidence.
Utilization of tools such as Archer, Splunk, Fidelis, Solera, Proofpoint, etc.
Prepare case evidence and incident reports. - Work on special projects as assigned.
May provide guidance and work leadership to less-experienced technical staff members.
Position may require evening, weekend or shift-work (depending on operational tempo)
Education and Experience:
HS/GED + 12 years
Associates Degree + 10 years
Bachelor’s Degree + 8 years
Master’s Degree + 6 years
PhD + 4 years
Training and Certifications:
IAT Level 2
TS/SCI with CI poly