For 29 years, clients in the private and public sectors have relied upon SOS International LLC (SOSi) for critical operations in the world’s most challenging environments. SOSi is privately held, was founded by its current ownership in 1989, maintains corporate headquarters in New York City, and specializes in providing logistics, construction, training, intelligence, and information technology solutions to the defense, diplomatic, intelligence and law enforcement communities.
All interested individuals will receive consideration and will not be discriminated against on the basis of race, color, religion, sex, national origin, disability, age, sexual orientation, gender identity, genetic information, or protected veteran status. SOSi takes affirmative action in support of its policy to advance diversity and inclusion of individuals who are minorities, women, protected veterans, and individuals with disabilities.
5-******-7016: Incident Response Analyst
LocationU.S. – Virginia – Fairfax
STG Inc, an affiliated company of SOS International LLC (SOSi) is looking to add a talented Incident Response Coordinator to its team in support of the United States Postal Service. This position is located in Falls Church, Virginia.
The ideal candidate will have the ability to work within a team in order to analyze activity on a complex network with the goal of protecting the confidentiality, integrity, and availability of USPS systems and data. Candidates must have an in-depth knowledge of networking, malware analysis, intrusion analysis, infection vector identification, and forensics.
Responds to crisis or urgent situations to mitigate immediate and potential threats.
Uses mitigation, preparedness, and response and recovery approaches as needed to maximize information security.
Handle response in relation to computer security incidents and escalate when necessary.
Investigate potential incidents or intrusions.
Recommend a course of action on each incident.
Manage and record all actions taken for each incident.
Serve as initial POC for events of interest, both internal and external.
Establish incident escalation process.
Maintain contact with affected parties during incident response life cycle.
4+ years of experience with security operations and incident response
Demonstrated experience with cyber investigations or cyber threat intelligence
Experience with tools such as Splunk, ArcSight, Wireshark
Excellent written and oral communication skills
Must have a Bachelors Degree in Computer Science, Information Technology, Information Security, or related field
Ability to obtain a security clearance
Masters Degree in Computer Science, information Technology, or Information Security
One or more of the following certifications:
GIAC Certified Incident Handler (GCIH)
To apply for this job please visit itjobpro.com.