Cyber Incident Response Analyst jobs in United States
cer-icon
Apply on Employer Site
company-logo

Peraton · 7 hours ago

Cyber Incident Response Analyst

Peraton is a next-generation national security company that drives missions of consequence spanning the globe. They are seeking a Cyber Incident Response Analyst to manage the full lifecycle of cybersecurity incidents and contribute to the refinement of defensive playbooks.

Information TechnologyRobotics
badNo H1BnoteSecurity Clearance RequirednoteU.S. Citizen Onlynote

Responsibilities

Independently manage the full lifecycle of low to medium-severity security incidents, beginning with the continuous monitoring and triage of alerts from SIEM and EDR tools, and proceeding through containment, eradication, and recovery
Conduct detailed analysis of logs from various sources, including network devices, servers, and applications, as well as endpoint data from EDR platforms to investigate security events
Utilize security tools to contain active threats, such as isolating endpoints or blocking malicious IP addresses. Execute and verify remediation steps to resolve the incident
Execute complex incident response playbooks and provide constructive feedback to senior handlers for the refinement and improvement of current procedures
Create clear and comprehensive incident reports detailing the timeline of events, investigative steps, root cause analysis, and actions taken to resolve the incident

Qualification

Incident Lifecycle ManagementCyber Security CertificationsLogEndpoint AnalysisCyber Security ControlsNetwork AnalysisEndpoint SecurityTool FamiliarityMilitary/DoD Experience

Required

Active DoD Secret Clearance
0 years with BS/BA; 4 years no degree
Candidates must possess one of the following certifications prior to start date: CompTia Security+, Certified Ethical Hacker (CEH), CYSA+
Foundational understanding of cybersecurity controls and the importance of adhering to security policies in a professional environment

Preferred

Experience with Enterprise, Military or Department of War (DOW) operational environment
Familiarity with U.S. military policies, procedures, and organizational structures
Basic experience reviewing network activity logs and an understanding of common network protocols (e.g., DNS, HTTP, SMB)
Familiarity with reviewing security events from standard endpoint platforms (e.g., antivirus, host firewalls)
Exposure to or academic experience with some of the following tools: A SIEM platform (e.g., Splunk, Kibana, Sentinel), MDE EDR platform and or KQL, ServiceNow or another ticketing system, Linux Command Line

Benefits

Employees may be eligible for overtime
Shift differential
Discretionary bonus

Company

Peraton Fearlessly solving the toughest national security challenges.

Funding

Current Stage
Late Stage

Leadership Team

leader-logo
Thomas Terjesen
Chief Information Officer
linkedin
Company data provided by crunchbase