Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
The Defensive Cyber Operations (DCO) division within the USARCC-SWA is looking for a candidate with strong scripting abilities, experience with systems security administration, and network security technologies. The Incident Response Analyst will design, implement, automate, maintain, and optimize measures protecting systems, networks, and information. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
+ Detect, document, and report potential or confirmed incidents and security issues.
+ Analyze events utilizing Security Information Event Management (SIEM) systems, Big Data Analytics, and other supporting platforms or applications.
+ Conduct Incident Handling actions in accord to established procedures.
+ Staff, coordinate and perform Incident Response investigations.
+ Conduct quality control of incidents and investigations to maintain compliance with applicable policies.
+ Develop recommendations to enhance detection capabilities and implement mitigation measures in response to general or specific threats (attempted exploits, attacks, malware delivery, etc.).
+ Design and integrate custom rules and reports within data collection platforms. Prepare technical summaries and briefings.
+ Provide technical expertise regarding the defense of information systems and networks.
+ Correlate event data to create situational awareness and trend analysis reports.
+ The work environment will be 95% indoor and 5% outdoor.
+ Perform additional duties as assigned.
Qualifications
+ Qualifications:
+ Education / Certifications: One year of related experience may be substituted for one year of education, if degree is required.
+ Associate Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
+ This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows:
+ IAT Level: CSSP Incident Responder
+ BASELINE:
+ Cisco: CCNA CyberOps
+ Cisco: CCNA Security
+ Cisco: SCYBER: Cybersecurity Specialty Certification
+ CompTIA: CySA+ ce: Cybersecurity Analyst
+ CompTIA: PenTest
+ + CyberSec: CFR: First Responder
+ EC-Council CEH: Certified Ethical Hacker
+ EC-Council: CHFI: Certified Hacking Forensic Investigator
+ GIAC: GCFA: Certified Forensic Analyst: Certified Forensic Analyst
+ GIAC: GCIH: Certified Incident Handler
+ COMPUTING ENVIRONMENT (CE):
+ Cisco: CCNP: Certified Network Professional (Any)
+ EC Council: ECIH: Certified Incident Handler
+ GIAC: GCFA: Certified Forensic Analyst
+ GIAC: GCIA: Certified Intrusion Analyst
+ GIAC: GCIH: Certified Incident Handler (preferred)
+ GIAC: GCWN: Certified Windows Security Administrator
+ GIAC: GDAT: Defending Advanced Threats
+ GIAC: GREM: Reverse Engineering Malware
+ GIAC: GSEC: Security Essentials
+ Microsoft: 365 Certified: Enterprise Administrator Expert
+ Microsoft: Certified: Azure Security Engineer Associate
+ Microsoft: Certified: Azure Solutions Architect Expert
+ Microsoft: MCSE: Core Infrastructure
+ Microsoft: MCSE: Database Management and Analytics
+ Microsoft: MCSE: Productivity Solutions Expert
+ Offensive Security: Certified Expert
+ Offensive Security: Certified Professional
+ Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience.
+ At least five (3) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security incident handling and SIEM event analysis.
+ Experience with a customer service-oriented company
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.
MNCJobsGulf.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.