View Our Website View All Jobs

Tier 1 Incident Response Analyst

BCMC has an immediate opening for a Tier Level 1 Incident Response Analyst. 

The Tier 1 Analyst assists Government in the management, maintenance, and maturing of the current Security Operations Center (SC) 24 hours a day, 7 days a week (24x7), 365 days a year (24x7x365) located in Washington, DC to protect the federal information systems infrastructure.  

  • Individual must have at least an Active Top Secret or above Security Clearance is preferred to be eligible to obtain SCI.  Individual with DHS Suitability is a plus.
  • Work location/Shift: Department of Homeland Security - Security Operations Center (SOC) night shift work 7:00pm to 7:00am Front Night shift (Sun-Tues & Alt Wed)
  • Certification Requirement:  Individual must have any of following Certification for this position:

COMPTIA (Security+, Cloud+, Network+, or Linux+), GSEC, GCIH, GCIA, GCFA, GPEN, GWAPT, GCFE, GSNA, GREM, GPPA, GCWN, GISF, GISP, GCEM, GWAN, GXPN, GSSP, OSCP, OSCE, OSWP, OSEE, SEI, CCFP, CCSP, CISSP, CSSLP, SSCP, CCNA, CCNP, GICSP, GWEB, GNFA, GSSP, GCPM, GMON, CCSNA Security, CCNA Industrial, CCNSP Security, CCIE Security< CEH, CHFI, LPT, ECSA, CCISO, ENSA, ECIH, CBDA ECSS, ECSP, ECSP, ECES, MCSE, and/or EnCE certifications.

Required Skills, Experiences, and Degree:

  • Tier 1 candidates shall have a minimum of one (1) year professional experience in network or UNIX/Linux system administration, software engineering, software development, and/or a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field. 
  • The candidates must have some experience working with various security methodologies and processes, knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, knowledge and experience configuring and implementing a diverse array of technical security solutions, and experience providing analysis and trending of security log data from a large number of heterogeneous security devices. 
  • Candidates shall also be proficient in at least one programming language, have experience with reverse engineering tools, a variety of operating systems and open source computer forensic tools, and a working understanding of computer forensic techniques and methodologies.
  • Be able to respond to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities. 

 

Read More

Apply for this position

Required*
Apply with Indeed
Attach resume as .pdf, .doc, or .docx (limit 2MB) or Paste resume

Paste your resume here or Attach resume file

To comply with government Equal Employment Opportunity / Affirmative Action reporting regulations, we are requesting (but NOT requiring) that you enter this personal data. This information will not be used in connection with any employment decisions, and will be used solely as permitted by state and federal law. Your voluntary cooperation would be appreciated. Learn more.
Gender
Race
Veteran/Disability status