BCMC has an immediate opening for a Tier Level 1 Incident Response Analyst.
The Tier 1 Analyst assists Government in the management, maintenance, and maturing of the current Security Operations Center (SC) 24 hours a day, 7 days a week (24x7), 365 days a year (24x7x365) located in Washington, DC to protect the federal information systems infrastructure.
- Individual must have at least an Active Top Secret or above Security Clearance is preferred to be eligible to obtain SCI. Individual with DHS Suitability is a plus.
- Work location/Shift: Department of Homeland Security - Security Operations Center (SOC) night shift work 7:00pm to 7:00am Front Night shift (Sun-Tues & Alt Wed)
- Certification Requirement: Individual must have any of following Certification for this position:
COMPTIA (Security+, Cloud+, Network+, or Linux+), GSEC, GCIH, GCIA, GCFA, GPEN, GWAPT, GCFE, GSNA, GREM, GPPA, GCWN, GISF, GISP, GCEM, GWAN, GXPN, GSSP, OSCP, OSCE, OSWP, OSEE, SEI, CCFP, CCSP, CISSP, CSSLP, SSCP, CCNA, CCNP, GICSP, GWEB, GNFA, GSSP, GCPM, GMON, CCSNA Security, CCNA Industrial, CCNSP Security, CCIE Security< CEH, CHFI, LPT, ECSA, CCISO, ENSA, ECIH, CBDA ECSS, ECSP, ECSP, ECES, MCSE, and/or EnCE certifications.
Required Skills, Experiences, and Degree:
- Tier 1 candidates shall have a minimum of one (1) year professional experience in network or UNIX/Linux system administration, software engineering, software development, and/or a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field.
- The candidates must have some experience working with various security methodologies and processes, knowledge of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, knowledge and experience configuring and implementing a diverse array of technical security solutions, and experience providing analysis and trending of security log data from a large number of heterogeneous security devices.
- Candidates shall also be proficient in at least one programming language, have experience with reverse engineering tools, a variety of operating systems and open source computer forensic tools, and a working understanding of computer forensic techniques and methodologies.
- Be able to respond to information system security incidents and an ability to use the DHS furnished toolset to identify and determine root causes of incidents and provide any required documentation and possible evidence to authorized personnel who carry legal or investigative authorities.