Cyber Incident Detector Level 4 104-036
See a complete list of our open positions
Apply at the Bottom of the Page
IC-CAP LLC is a Woman Owned / HUBZone Small Business working in the Department of Defense and Intelligence Community. We are always looking for highly talented, energetic, and dynamic professionals that are interested in protecting the defense of our nation.
Some of the positions are future positions. Please look at the opening line of the job description to determine if this is an open or future position.
Our positions are not remote unless stated in the job description below.
We are looking to fill this position at the following location(s):
- Colorado Springs, CO
Job Description
Cyber Incident Detector Level 4 will have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Your work in cyber security at GDIT will have an impact on securing our clients' missions and ensuring we anticipate the threats of tomorrow. At IC-CA{, people are our differentiator. As a Cyber Incident Detector you will help ensure today is safe and tomorrow is smarter.
Level 4:
Investigates, analyzes, and responds to cyber incidents within a network environment or enclave.
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within their environments for the purposes of mitigating threats.
Interprets, analyzes, and reports all events and anomalies in accordance with computer network directives, including initiating, responding, and reporting discovered events.
Evaluates, tests, recommends, coordinates, monitors, and maintains cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software.
Ensures that cybersecurity plans, controls, processes, standards, policies, and procedures are aligned with cybersecurity standards.
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security.
Researches and evaluates new concepts and processes to improve performance.
Analyzes cross-functional problem sets, identifies root causes and resolves issues.
Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
May coach and provide guidance to less-experienced professionals.
May serve as a team or task lead.
How a Cyber Incident Detector will make a Impact:
Perform forensic analysis of digital information and gathers and handles evidence. Identify network computer intrusion evidence and perpetrators, and coordinates with other government agencies to record and report incidents.
You must be passionate about technology, and able to learn the ropes of new security solutions rapidly..
Take the lead in day-to-day monitoring for unusual activities, implement defensive protocols, and report incidents.
Forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring, available tools both customer provided and open source, and pivoting/researching on previously reported Indicators of Compromise (IOCs).
Participate in collaborative sessions with other CNDSPs and Intelligence Community (IC) agencies on malicious intrusions, attacks or suspicious activities, as well as share emerging Cyber Threat Intel data.
Assist in the development of IOCs for active defensive countermeasures and passive detection signatures.
Day, Swing, or Mid Shift position available. Willing to work a weekend or holiday shift supporting your assigned shift.
Skills and Abilties:
Required
Must have common knowledge of standard network infrastructure.
Other items that would be good to know include: domain masquerading, certificates, and file hashing.
Familiar with monitoring emerging threats through Tools, Techniques, and Procedures (TTPs) and how they relate to the MITRE ATT&CK Framework
Good written communications skills are necessary to properly document and report the identification and sharing of newly identified IOCs.
Meticulous eye for detail and an ability to multitask in a fast-paced environment.
Maintain knowledge of current cybercrime tactics.
Education and Experience:
HSD/GED+12yrs
Associates+10yrs
Bachelors+8yrs
Masters+6yrs
PhD+4yrs
NOTE: Relevant professional certifications will be considered equivalent to six (6) months of relevant experience.
Training and Certifications:
IAT Level 2
Security Clearance:
Active TS/SCI and the willingness to sit for a polygraph, if needed
IC-CAP provides equal employment opportunities (EEO) to all applicants for employment without regard to race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, disability, genetic information, marital status.