drjobs Principle Incident Handler

Principle Incident Handler

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Monterey, CA - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

About ARSIEM Corporation

At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. Weprovide support to multiple agencies across the United States Government. ARSIEMhas an experienced workforce of qualified professionals committed to providing the best possible support.

As demand increases ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our means a career packed with opportunities to grow and the ability to have an impact on every client you work with.

ARSIEM Corporation is seeking a highly skilled Principal Incident Handler (IH-P) to lead cyber incident response operations in a fast-paced mission-critical environment. As the senior-most responder on the team youll provide technical oversight mentor junior analysts and serve as a strategic advisor to the Cyber Security Operations Center (CSOC) leadership. This position will support one of our government clients in Monterey CA.

Responsibilities

    • Lead and guide Tier I and II analysts during active incidents ensuring high-quality response and knowledge transfer.
    • Drive updates to incident handling SOPs and evaluate access tools and workflows to support full-spectrum cyber defense.
    • Oversee incident response from alert to resolution including detection triage analysis containment and remediation.
    • Conduct root cause analysis and present findings to stakeholders including the CSOC Manager ISSM and CISO.
    • Ensure digital evidence is preserved properly and in accordance with legal/operational standards.
    • Recommend enhancements to security tooling and lead technical coordination with engineering and forensics teams.

Minimum Qualifications

    • 7 years in incident response malware analysis or cyber forensics.
    • Bachelors degree in CS Engineering Cybersecurity or related field.
    • Demonstrated experience guiding technical teams through complex cybersecurity incidents.
    • Deep familiarity with detection technologies (SIEM IDS/IPS) network protocols malware containment and threat analysis.
    • Strong written and verbal communication skills including incident reporting and executive briefings.
    • Strong understanding of network protocols (e.g. TCP/IP DNS) security architecture and traffic analysis
    • Strong understanding of threat actor behaviors attack stages and common vulnerabilities
    • Strong understanding of host/network intrusion detection malware handling and secure system administration
    • Strong understanding of cloud service models and how they affect response strategies
    • Strong understanding of cybersecurity frameworks privacy principles and risk mitigation
    • Relevant industry certifications (e.g. CISSP GCIA GCIH CEH) preferred but not required.
$116000 - $129000 a year
The ARSIEM pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) job responsibilities education experience knowledge skills and abilities as well as internal equity alignment with market data applicable bargaining agreement (if any) or other laws.

Benefits:
For an overview of our benefits please visit our benefits tab.

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.