ECS · 18 hours ago
Mid Cyber Incident Analyst
ECS is a leading mid-sized provider of technology services to the United States Federal Government. They are seeking a Mid Cyber Incident Analyst to provide deep technical analysis during active cyber incidents and support the Cybersecurity and Infrastructure Security Agency’s Joint Cyber Defense Collaborative.
Artificial Intelligence (AI)Cloud InfrastructureComplianceConsultingCyber SecurityInformation TechnologyMachine LearningSecuritySoftware
Responsibilities
Perform analysis on active cyber incidents, events and vulnerabilities to provide guidance and targeted recommendations for mitigation
Support the development of written guidance and recommendations to assist JCDC partners with solutions for active and ongoing cyber vulnerabilities
Stay current with emerging technologies and trends in cybersecurity, and apply this knowledge to improve threat detection and mitigation efforts
Through hands-on analysis provide insights into vulnerabilities, adversarial tactics, and mitigation strategies across diverse environments like IT, OT/ICS, cloud, and AI systems
Assist with mapping technical insights on cyber threats to frameworks like MITRE ATT&CK and other cyber frameworks
Support a team in the translation of strategic products into clear, practical formats that are tailored to the specific needs and operational constraints of different stakeholder groups, including large and small jurisdictions and critical infrastructure (CI) partners
Assist in the tailoring of vulnerability mitigation recommendations and contextualized examples to stakeholders to address implementation challenges and encourage rapid adoption
Qualification
Required
US Citizenship and the ability to obtain and maintain a minimum of DHS (Suitability) EOD/ Public Trust
6+ Years of previous experience in a threat intelligence, cyber security, incident response, or similar role
Strong understanding of computer and network fundamentals
Basic understanding of computer architecture, operating systems, vulnerabilities, encryption, or other areas of expertise
Experience defining data sources and writing detection rules for discovering malicious behavior
With minimum support perform in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process
Excellent written and oral communication skills
An understanding of current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source
Preferred
Familiarity with the .gov Cyber Mission space and legal constraints applicable to civilian Government Agencies (e.g., FISMA)
Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports
Familiarity with at least one scripting language such as Python, and capable of manipulating data, interfacing with APIs, automating repetitive tasks, etc
Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.)
Field-related certifications such as (CTIA, CEH, GREM, GCIH, GCFA)
Experience with tools in both Linux and Windows environments
Experience applying AI/ML to identify anomalous behavior in security data, esp. using Elasticsearch
Familiarity with MITRE ATT&CK and/or similar frameworks
Familiarity with AI/ML concepts and applications
Possess a TS security clearance and be SCI eligible
DHS Entry on Duty (EOD) clearance
Company
ECS
ECS is a fast-growing 4,000-person, $1.2B provider of advanced technology solutions for federal civilian, defense, intelligence, and commercial customers.
Funding
Current Stage
Late StageTotal Funding
unknown2018-01-31Acquired
2015-04-10Private Equity
Recent News
2025-11-19
2025-03-26
2025-02-14
Company data provided by crunchbase