Information Security Senior Specialist
Role details
Job location
Tech stack
Job description
The Cyber Defense & Incident Responder is responsible for monitoring, analyzing, and responding to assigned cybersecurity incidents in accordance with established procedures. This role focuses on incident triage, investigation, containment, and recovery to minimize impact and restore normal operations. Analysts leverage security tools, event logs, correlation data, and threat intelligence to determine the nature and scope of incidents, document findings, and recommend remediation steps., 1. Monitor enterprise security systems and analyze alerts to identify potential cybersecurity incidents.
a. Review SIEM, IDS/IPS, EDR, and other related tool alerts for anomalous activity and indicators of compromise/attacks (IOCs/IOAs).
b. Validate alerts to reduce false positives and prioritize based on severity and potential impact.
- Perform initial triage and analysis of security events to determine scope, severity, and urgency.
a. Examine log data, network telemetry, and endpoint information to identify possible malicious activity.
b. Correlate event details with internal and external threat intelligence.
- Execute incident response actions in accordance with established procedures.
a. Contain affected systems, remove malicious artifacts, and assist in system recovery.
b. Escalate complex or critical incidents to Senior SOC Analysts or SOC Leads.
- Document and communicate incident findings to support resolution and improvement efforts.
a. Prepare incident tickets, timelines, and investigative notes.
b. Contribute to after-action reviews (AARs) and post-incident reporting.
c. Create incident tickets
d. Upload supporting evidence, draw sound conclusions and upload artifacts
e. Communicate effectively, providing clear, accurate, and concise information
f. Exercise sound analytical skills to derive correct conclusions associated with incident investigations.
- Maintain SOC processes, tools, and playbooks to ensure effective incident handling.
a. Recommend refinements to SOPs and escalation procedures.
b. Identify opportunities to streamline analysis workflows and improve detection capabilities.
- Participate in training, exercises, and knowledge-sharing to strengthen response readiness.
a. Support red, blue, or purple team exercises when directed.
b. Share lessons learned and best practices with SOC team members.
- Stay informed on current and emerging cyber threats relevant to the organization's environment.
a. Track evolving tactics, techniques, and procedures (TTPs) of threat actors.
b. Incorporate relevant intelligence into incident analysis and response.
Requirements
-
Bachelor's degree in information technology, cybersecurity, data science, information systems, or computer science.
-
Education Equivalency: One-and-one- half (1.5) years of additional experience can substitute for one (1) year of a typical degree program.
Minimum 6 years of experience in Information Technology (IT) and/or Information Security (IS).
DoD 8140 certification for their respective area or the ability to obtain certification within six (6) months of onboarding.
Ability to obtain a interim Secret Security Clearance and must be eligible for a Top-Secret clearance if requested.