Department of Homeland
Security (DHS), Security Operations Center (SOC) Support Services is a US
Government program responsible to monitor, detect, analyze, mitigate, and
respond to cyber threats and adversarial activity on the DHS Enterprise.
The DHS SOC has primary responsibility for monitoring and responding to
security events and incidents detected at the Trusted Internet Connection (TIC)
and Policy Enforcement Point (PEP) and is responsible for directing and
coordinating detection and response activities performed by each Component SOC.
Direction and coordination are achieved through a new shared DHS incident
tracking system and other means of coordination and communication. The DHS SOC Support Services Program has a critical need for a Tier 2 Cyber Threat Analyst who will working 12 hours shifts Sunday, Monday, Tuesday, and alternating weeks, 8 hours on Wednesday.Tier 2 Cyber Threat Analyst should have expertise in one of
the following specialized areas: - Email security - Digital media forensic -
Monitoring and detection - Incident Response - Vulnerability assessment and pen
test - Cyber intelligence analysis Supports detection, containment, and
eradication of APT activities targeting customer networks. Process community
reporting, conduct link analysis, and collaborate with other Government cyber
fusion teams. Publish intelligence products to inform network defenders about
APT activities, new detection methods, among other topics of interest. This
position location is in the Washington Metropolitan Area.LeadGenLeadGenCyber
Minimum of current Top Secret clearance with ability to
obtain TS/SCI Clearance. In addition to specific security clearance
requirements all Department of Homeland Security SOC employees are required to
obtain an Entry on Duty (EOD) clearance to support this program.
Bachelors degree in Computer Science, Engineering,
Information Technology, Cyber Security, or related field. Minimum of 7 years of
professional experience in incident detection and response, malware analysis,
or cyber forensics
In addition, minimum of five (5) years of specialized
experience in one or more of the following areas:Email securityDigital
media forensicMonitoring and detectionIncident ResponseVulnerability
assessment and pen testCyber intelligence analysis Must have at least one of
the following certifications: SANS GIAC: GCED, GCIA, GCFA, GPEN, GWAPT, GCFE,
GREM, GXPN, GMON or GCIH ISC2 CCFP, CCSP, CISSP CERT CSIH EC Council: CHFI,
LPT, ECSA, Offensive Security: OSCP, OSCE, OSWP and OSEE EnCase: EnCE Dod 8570:
IAT L3, CNDSP Analyst or IR Carnegie Mellon: CCSIH"
Extensive experience analyzing and synthesizing information
with other relevant data sources, providing guidance and mentorship to others
in cyber threat analysis and operations, evaluating, interpreting, and
integrating all sources of information, and fusing computer network attack
analyses with counterintelligence and law enforcement investigations.
Desired Skills: Experience in cyber government, and/or
federal law enforcement. Experience with Cyber Kill Chain. Experience in cyber
government, and/or federal law enforcement. Experience with Cyber Kill Chain.
External Referral Bonus:
Potential for Telework:
Clearance Level Required:
Scheduled Weekly Hours: