ARSIEM Corporation · 2 months ago
Incident Manager III
ARSIEM Corporation is committed to fostering a proven and trusted partnership with government clients, providing reliable technical solutions. They are looking for a Cyber Action Officer to manage cyber incidents, coordinate with stakeholders, and maintain reporting systems.
Cyber SecurityEmbedded SoftwareEnterprise ApplicationsSoftwareSoftware Engineering
Responsibilities
Supporting the management of cyber incidents through the incident response lifecycle
Creating and maintaining routine reporting of cyber incidents in official systems of record, including case management systems and ticketing systems
Coordinating with internal and external customers, partners, and stakeholders
Ingesting, validating, and evaluating information to determine optimal courses of action, including providing response support to requesting entities
Updating and tracking cases and tickets with accuracy, timeliness, reliability, and consistency
Drafting summaries of ongoing operations and being able to provide oral presentations for various levels of leadership
Maintaining knowledge objects in the system of record consistently and professionally
Threat and vulnerability management to recognize and categorize types of vulnerabilities, threat actors, and different operational threat environments, and associated attacks (MITRE ATT&CK framework)
Knowledgeable of network security monitoring and/or security operations analysis, system administration, operating system hardening, cyber hygiene techniques, and cybersecurity defense policies, procedures, and regulations
Qualification
Required
BS in Incident Management, Operations Management, Cybersecurity, or related degree. HS Diploma with 7-9 incident management or cyber security experience
5+ years of directly relevant experience in cyber incident management or cybersecurity operations
Knowledge of incident response, threat hunting, and handling methodologies
Ability to track multiple active engagements, personnel or equipment deployments, as well as coordinate with internal and external stakeholders
Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incidents
Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
Skill in recognizing threat actor campaigns, tactics, techniques, and procedures
Familiar with basic system and network administration, traffic analysis techniques, Computer Network Defense policies, procedures, and regulations
Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation-state sponsored], and third generation [nation-state sponsored])
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
Excellent oral and written communication skills
Preferred
Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [non-nation-state sponsored], and third generation [nation-state sponsored])
Familiarity with system and application security threats and attack methods (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code)
Desired Certifications: GCIH
Benefits
$3,500 bonus for candidate referral