Cyber Incident Responder Fusion ECND018
IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community. We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.
Some of the positions are future positions. Please look at the opening line of the job description to determine if this is an open or future position.
Our positions are not remote unless stated in the job description below.
We are looking to fill this position at the following location(s):
- Reston, VA
Cyber Incident Responder Fusion:
Skill Level 4:
Skills and Tasks: Exceptionally Complex, Inter-Discipline, Inter-Organizational. Can perform tasks of senior level technicians, specialists, and or managers not performed at Level 3 due to the size and/or complexity of the tasks.
Leadership/Management: May work individually or as a key member of a senior leadership team. Oversees and monitors performance across several disciplines, and when required, takes steps to resolve issues.
Guidance: Provides expert guidance and direction to Government and Vendor senior level technicians and managers. Directs multiple contractor and subcontractor teams through to project completion.
The successful applicant should be expected to identify potential cyber threats, determine levels of risk, and produce analytical reports for a variety of audiences. You will occasionally be required to present your findings in front of senior executives, so the ability to translate technical indicators into layperson’s terms is vital.
Outstanding problem-solving skills are essential. When serious threats are identified, you will work closely with other areas of the security team to identify appropriate solutions. You must be passionate about technology, and able to learn the ropes of new security solutions rapidly.
Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open Source Intel (OSINT) review/monitoring, available tools both customer provided and free, and pivoting/researching on previously reported IOCs.
Must have common knowledge of standard network infrastructure.
Other items that would be good to know include: domain masquerading, certificates, and file hashing.
Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK framework
Participate in collaborative sessions with other CNDSPs and IC agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.
Assist in the development of IOCs for active defensive countermeasures and passive detection signatures.
Good written communications skills are necessary in order to properly document and report the identification and sharing of newly identified IOCs.
Attention to detail and ability to work with team-members and independently.
Education and Experience:
HS/GED + 12 years
Associates Degree + 10 years
Bachelor’s Degree + 8 years
Master’s Degree + 6 years
PhD + 4 years
Training and Certifications:
IAT Level 2
TS/SCI with CI poly