Incident Handler


We are Looking for an experienced system security engineer with knowledge of DoD cybersecurity requirements. Must have hands on security specialist reporting to the cybersecurity lead or manager. Selectee is responsible for Integrating and implementing computer system security solutions and must be an experienced cybersecurity and information assurance engineer with demonstrated experience and ability to do the following:

* Analyzes security events in partnership with other support organizations to counteract malicious activity detected on the network.
* Implements methods and tools that support Computer Network Defense Service Provider Program (CNDSP) operations in support of the customer’s mission.
* Analyzes security events using approved tactics, techniques, tools and procedures.
* Elevates security events for further investigation.
* Provides input for security incident reports.
* Performs basic-level risk analyses tasks, which also includes risk assessment.
* Knowledgeable of Security/Information Assurance (IA) products such as PKI, VPN, firewalls, and intrusion detection and prevention systems.
* Travel to other countries may be required.
* Other duties as documented in the Statement of Work (SOW).

Experience and Skills:

1) Top Secret SCI
2) IT or technical BS degree in Computer Science, Information Systems, or related technical degree.

Information security related disciplines are preferred.

* Incident Response

3) (2-4) years of Cybersecurity experience in DoD or comparable US Government security management experience as a vendor to the US Government or as a US Government employee.
4) Demonstrated experience with incident response consistent with DoDD O-8530.1; NIST 800 series, specifically, NIST 800-61, Rev2 “Computer Security Incident Handling Guide” and NIST 800-86 “Guide to Integrating Forensic Techniques into Incident Response” and any other controls and tools (e.g. Hercules VMS, SCCM, HBSS, McAfee and Symantec antivirus) that are applicable to information and network system security. Must be familiar with networking hardware and software; including routers, switches, firewalls, and TCP/IP. Ability to use analysis tools and develop testing procedures. Superior knowledge of computer operations and hacker techniques and exploits. Ability to analyze data from various sources and draw conclusions regarding past and future cyber incidents. Demonstrated experience with establishing security controls to protect information systems and application of open- and closed-source resources consistent within the industry. Specific experience in monitoring, evaluating, and interpreting vulnerabil ities, CVEs, remedies, mitigation measures, techniques for escalation, social engineering tactics, phishing techniques, and performing vulnerability assessments.

At least one (1) certification from IAT Level II and one (1) from the CNDSP category of the following companies is required: (ISC)2, SANS Institute, CompTIA, Cisco Systems, Software Engineering Institute (SEI) or the EC-Council

* Information Assurance Technician Level II (IAT II)
o System Security Certified Practitioner (SSCP)
o GIAC Security Essentials Certification (GSEC)
o Security+ CE
o CCNA-Security

* Computer Network Defense Service Provider (CNDSP) Analyst
o Security Certified Practitioner (SSCP)
o GIAC Certified Incident Analyst (GCIA)
o GIAC Certified Incident Handler (GCIH)
o Certified Ethical Hacker (C|EH)

* CNDSP Infrastructure Support
o System Security Certified Practitioner (SSCP)
o Certified Ethical Hacker (C|EH)

* CNDSP Incident Responder
o GIAC Certified Incident Handler (GCIH)
o Certified Ethical Hacker (C|EH)
o CERT – Certified Computer Security Incident Handler (CSIH)
o GIAC Certified Forensic Analyst (GCFA)

* CNDSP Auditor
o GIAC Systems and Network Auditor (GSNA)
o Certified Ethical Hacker (C|EH)
o Certified Information Systems Auditor (CISA)

Certified Information System Security Professional (CISSP).
Demonstrated experience with DODI 8500.01, ” Cybersecurity “, (2014), DODI 8510.01, ” Risk Management Framework (RMF) for DoD Information Technology (IT)”, (2014)
Demonstrated experience with and application in establishing security controls to protect information systems consistent within the industry.
Demonstrated experience with and application of open- and closed-source resources within industry.

Specific experience in monitoring, evaluating, and interpreting vulnerabilities, CVEs, remedies, mitigation measures, techniques for escalation, social engineering tactics, phishing techniques, and performing vulnerability assessments

CenCore, LLC is an equal opportunity employer and offers a professional work environment designed to enhance your personal career growth.

ApplySee More Positions