We connect our employees with some of the best opportunities around.
Time and again our employees tell us that the most important thing we offer is respect. Federal Staffing Solutions puts people to work in all types of jobs. When you work with us you build a relationship with a team of employment professionals in your community who have in turn built professional relationships with the businesses that are hiring.
We are looking for a Tier 1 AS&W Night Front Jr. to work in Ashburn VA supporting our client.
Salary: $95000
Clearance: US Citizen
Basic Qualifications:
- Must have a current or be able to favorably pass a 5 year background investigation (BI).
- Bachelor s degree in Computer Science Engineering Information Technology Cyber Security or related field
- Minimum of two years of professional experience in incident detection response and remediation.
- Minimum of two (2) but (3) preferred years of specialized experience in one or more of the following areas: o Email security o Digital media forensic o Monitoring and detection o Incident Response o Vulnerability assessment and pen test o Cyber intelligence analysis
- Extensive experience analyzing and synthesizing information with other relevant data sources providing guidance and mentorship to others in cyber threat analysis and operations
- Evaluating interpreting and integrating all sources of information and fusing computer network attack analyses with counterintelligence and law enforcement investigations.
- Experience with aggregating and creating daily weekly and monthly reports with emphasis on communication skills to accurately convey technical concepts to various audiences.
- Required certifications: The candidate should have at minimum ONE of the following certifications: CompTIA Advanced Security Practitioner (CASP) CompTIA Cloud CompTIA Network CompTIA Security CompTIA Linux CompTIA Cyber Security Analyst (CySA) CompTIA Linux Network Professional (CLNP) CompTIA Pentest CompTIA A CompTIA Cybersecurity Analyst (CySA) CompTIA Server GSEC Security Essentials GCIH Incident Handler GCIA Intrusion Analyst GCFA Forensic Analyst GPEN Penetration GWAPT Web Application Penetration Tester GCFE Forensic Examiner CEH Certified Ethical Hacker CHFI Computer Hacking Forensic Investigator CSA EC Council Certified SOC Analyst (Previously ECSA ECCouncil Certified Security Analyst) ECIH ECCouncil Certified Incident Handler CNDA Certified Network Defense Architect
Preferred Qualifications:
- Ability to coordinate and communicate well with team leads and government personnel
- Provide weekly status reports and requested documentation
- Experience in cyber government and/or federal law enforcement
- Experience with Cyber Kill Chain Clearance:
- All Department of Homeland Security CBP SOC employees are required to favorably pass a 5year (BI) Background Investigation
Essential Requirements: US Citizenship is required.
Physical Demands: The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job with or without reasonable accommodation. While performing the duties of this job the employee will regularly sit walk stand and climb stairs and steps. May require walking long distance from parking to work station. Occasionally movement that requires twisting at the neck and/or trunk more than the average person squatting/ stooping/kneeling reaching above the head and forward motion will be required. The employee will continuously be required to repeat the same hand arm or finger motion many times. Manual and finger dexterity are essential to this position. Specific vision abilities required by this job include close distance depth perception and telling differences among colors. The employee must be able to communicate through speech with clients and public. Hearing requirements include conversation in both quiet and noisy environments. Lifting may require floor to waist waist to shoulder or shoulder to overhead movement of up to 20 pounds. This position demands tolerance for various levels of mental stress.
Job Duties:
- Conduct log analysis and triage in support of incident response.
- Recognize attacker and APT activity tactics and procedures as indicators of compromise (IOCs) that can be used to improve monitoring analysis and incident response.
- Develop and build security content scripts tools or methods to enhance the incident investigation processes.
- Work with key stakeholders to implement remediation plans in response to incidents.
- Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.
- Flexible and adaptable selfstarter with strong relationshipbuilding skills
- Strong problemsolving abilities with an analytic and qualitative eye for reasoning
- Ability to independently prioritize and complete multiple tasks with little to no supervision
- Emphasis on ability to succinctly and accurately capture technical details and summarize findings for less technical audiences.
Equal Opportunity Employer
Basic Qualifications: must have a current or be able to favorably pass a 5 year background investigation (BI). Bachelor s degree in Computer Science, Engineering, Information Technology, Cyber Security, or related field. Minimum of two years of professional experience in incident detection, response and remediation. Minimum of two (2) but (3) preferred years of specialized experience in one or more of the following areas: o Email security o Digital media forensic o Monitoring and detection o Incident Response o Vulnerability assessment and pen test o Cyber intelligence analysis Extensive experience analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations, Evaluating, interpreting, and integrating all sources of information, and fusing computer network attack analyses with counterintelligence and law enforcement investigations. Experience with aggregating and creating daily, weekly and monthly reports with emphasis on communication skills to accurately convey technical concepts to various audiences. Required certifications: The candidate should have at minimum ONE of the following certifications: CompTIA Advanced Security Practitioner (CASP) CompTIA Cloud+ CompTIA Network+ CompTIA Security+ CompTIA Linux+ CompTIA Cyber Security Analyst (CySA+) CompTIA Linux Network Professional (CLNP) CompTIA Pentest+ CompTIA A+ CompTIA Cybersecurity Analyst (CySA+) CompTIA Server+ GSEC Security Essentials GCIH Incident Handler GCIA Intrusion Analyst GCFA Forensic Analyst GPEN Penetration GWAPT Web Application Penetration Tester GCFE Forensic Examiner CEH Certified Ethical Hacker CHFI Computer Hacking Forensic Investigator CSA EC Council Certified SOC Analyst (Previously ECSA EC-Council Certified Security Analyst) ECIH EC-Council Certified Incident Handler CNDA Certified Network Defense Architect Preferred Qualifications: Ability to coordinate and communicate well with team leads and government personnel Provide weekly status reports and requested documentation Experience in cyber government, and/or federal law enforcement Experience with Cyber Kill Chain Clearance: All Department of Homeland Security CBP SOC employees are required to favorably pass a 5-year (BI) Background Investigation Essential Requirements: US Citizenship is required.