Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Deputy Incident Response Lead (Mid) image - Rise Careers
Job details

Deputy Incident Response Lead (Mid)

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.


Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.


Requisition #587 

Job Title: Incident Response Analyst

Location: 22001 Loudoun County Pkwy Ashburn, Virginia 20147

Clearance Level: Active DoD - Secret


SUMMARY

The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection and protective security services to DHS's information systems.  The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.

We are currently looking for a qualified Mid Level Deputy IR Lead.


JOB DUTIES AND RESPONSIBILITIES

·       Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.

·       Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.

·       Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.

·       Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.

·       Lead  Incident Response activities and mentor junior SOC staff.

·       Work with key stakeholders to implement remediation plans in response to incidents.

·       Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.

·       Flexible and adaptable self-starter with strong relationship-building skills

·       Strong problem solving abilities with an analytic and qualitative eye for reasoning

·       Ability to independently prioritize and complete multiple tasks with little to no supervision

 

Education, Background, and Years of Experience

·       Bachelor’s degree in Science or Engineering Field, IT, or Cybersecurity  or related field


ADDITIONAL SKILLS & QUALIFICATIONS

Required Skills

·       Must be a US citizen, no clearance required, prefer Secret Clearance with the ability to obtain TS/SCI.

·       3+ years of experience be in the areas of incident detection and response, remediation malware analysis, or computer forensics.

·       Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.

·       Ability to script in one more of the following computer languages Python, Bash, Visual Basic or Powershell

Required Certifications

·       One of the following certifications:

·       CCFP – Certified Cyber Forensics Professional

·       CCNA Security

·       CCNP Security

·       CEH – Certified Ethical Hacker

·       CHFI – Computer Hacking Forensic Investigator

·       CISSP – Certified Information Systems Security

·       CIRC

·       ECES – EC-Council Certified Encryption Specialist

·       ECIH – EC-Council Certified Incident Handler

·       ECSA – EC-Council Certified Security Analyst

·       ECSS – EC-Council Certified Security Specialist

·       EnCE

·       ENSA – EC-Council Network Security Administrator

·       FIWE

·       GCFA – Forensic Analyst

·       GCFE – Forensic Examiner

·       GCIH – Incident Handler

·       GISF – Security Fundamentals

·       GNFA – Network Forensic Analyst

·       GREM – Reverse Engineering Malware

·       GWEB – Web Application Defender

·       GXPN – Exploit Researcher and Advanced Penetration Tester

·       LPT – Licensed Penetration Tester

·       OSCE (Certified Expert)

·       OSCP (Certified Professional)

·       OSEE (Exploitation Expert)

·       OSWP (Wireless Professional)

·       WFE-E-CI

·       FTK-WFE-FTK

·       CompTIA Cyber Security Analyst (CySA+)

·       CompTIA Linux Network Professional (CLNP)

·       CompTIA PenTest+

·       GCTI – Cyber Threat Intelligence

·       GOSI – Open Source Intelligence

·       CTIA – Certified Threat Intelligence Analyst

·       Splunk Core Certified Advanced Power User

·       Splunk Core Certified Consultant

·       Splunk SOAR Certified Automation Developer

·       IACRB Certified Security Awareness Practitioner (CSAP)

Preferred Skills

·       Experience in Federal Government, DOD or Law Enforcement in CND, IR or SOC role

·       Cyber Kill Chain Knowledge


WORKING CONDITIONS

Environmental Conditions

·       Monday - Friday, regular business hours

·       Hybrid Schedule

Strength Demands

·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Physical Requirements

·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull


Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.


Happy - Be Infectious.

Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.


Helpful - Be Supportive.

Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.


Honest - Be Trustworthy.

Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.


Humble - Be Grounded.

Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.


Hungry - Be Eager.

Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.


Hustle - Be Driven.

Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.


Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)

Agile Defense Glassdoor Company Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
Agile Defense DE&I Review
4.7 Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon
CEO of Agile Defense
Agile Defense CEO photo
Jay Lee
Approve of CEO

Average salary estimate

$100000 / YEARLY (est.)
min
max
$80000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Deputy Incident Response Lead (Mid), Agile Defense

Agile Defense is on the lookout for a dynamic Deputy Incident Response Lead (Mid) located in the bustling tech hub of Ashburn, VA. This role is essential in our Security Operations Center (SOC), where creativity meets cutting-edge technology to combat cyber threats. As a Deputy Incident Response Lead, you will leverage state-of-the-art tools and methodologies, including malware analysis and host forensics, to monitor, detect, and respond to security incidents like a pro. Picture yourself leading investigative activities, mentoring junior SOC staff, and collaborating with key stakeholders to implement effective remediation plans. We're all about using proactive measures and an analytical mindset to recognize and thwart attacks before they escalate. With Agile Defense, you’ll be part of a supportive and innovative culture that embodies our six core values: Happy, Helpful, Honest, Humble, Hungry, and Hustle. Join a company that values its employees as family members, and be prepared to grow your skills and experience in an environment that champions diversity and inclusion. All of this while contributing to critical national security missions! If you have a solid background in incident detection and response, computer forensics, and a passion for cybersecurity, we want to hear from you. Don’t miss this chance to become part of a resilient team dedicated to making a difference.

Frequently Asked Questions (FAQs) for Deputy Incident Response Lead (Mid) Role at Agile Defense
What are the responsibilities of a Deputy Incident Response Lead at Agile Defense?

As a Deputy Incident Response Lead at Agile Defense, your main responsibilities will involve using advanced tools to conduct malware analysis, lead incident response activities, and mentor junior SOC staff. You will also coordinate with key stakeholders to implement remediation plans and communicate critical findings effectively.

Join Rise to see the full answer
What qualifications do I need to apply for the Deputy Incident Response Lead position at Agile Defense?

To qualify for the Deputy Incident Response Lead role at Agile Defense, you should have a bachelor’s degree in a relevant field such as IT or Cybersecurity, along with at least three years of experience in incident detection and response or computer forensics. A Secret clearance and experience within federal government contexts are preferred.

Join Rise to see the full answer
What does the work environment look like for a Deputy Incident Response Lead at Agile Defense?

The work environment for a Deputy Incident Response Lead at Agile Defense is hybrid, allowing flexibility in your daily routine. You’ll enjoy regular business hours from Monday to Friday while being part of a culture where teamwork, integrity, and high ethical standards are highly emphasized.

Join Rise to see the full answer
What tools and technologies will I work with as a Deputy Incident Response Lead at Agile Defense?

In the Deputy Incident Response Lead position at Agile Defense, you will work with sophisticated technologies such as host forensics tools (like FTK/Encase), Endpoint Detection & Response tools, and log analysis tools such as Splunk. You will also utilize network forensics solutions to conduct investigations and enhance incident response.

Join Rise to see the full answer
How can I prepare for an interview for the Deputy Incident Response Lead role at Agile Defense?

To prepare for an interview for the Deputy Incident Response Lead position at Agile Defense, familiarize yourself with incident response processes, cyber threat detection, and forensic analysis techniques. Practicing common interview questions, and aligning your responses with Agile Defense's core values can set you up for success.

Join Rise to see the full answer
What opportunities for growth and learning are available for Deputy Incident Response Leads at Agile Defense?

At Agile Defense, Deputy Incident Response Leads are encouraged to continually learn and grow through hands-on experience, mentorship programs, and access to professional certifications. The company's commitment to innovation means you'll always have a chance to enhance your skills and advance your career.

Join Rise to see the full answer
What is the culture like at Agile Defense for Deputy Incident Response Leads?

Agile Defense fosters a culture built around the values of happiness, helpfulness, honesty, humility, hunger, and hustle. As a Deputy Incident Response Lead, you'll be part of an environment that prioritizes employee well-being, teamwork, continuous improvement, and a commitment to national security missions.

Join Rise to see the full answer
Common Interview Questions for Deputy Incident Response Lead (Mid)
How do you approach incident detection and response?

When discussing your approach to incident detection and response, highlight specific methodologies and frameworks you have used. Emphasize your analytical skills, team collaboration, and how you utilize technology for efficient incident management.

Join Rise to see the full answer
Can you describe a situation where you successfully identified and mitigated a cyber threat?

When answering this question, share a detailed story that outlines the challenge you faced, the process you undertook to identify the threat, and the successful mitigation steps you executed. Provide metrics if possible to demonstrate success.

Join Rise to see the full answer
What tools are you most comfortable using for incident monitoring?

Be prepared to discuss your experience with various incident monitoring tools like Splunk, FTK, or Encase. Explain why you prefer those tools and how they have enhanced your effectiveness in identifying and responding to incidents.

Join Rise to see the full answer
How do you prioritize tasks during a major incident?

Share your method for prioritizing tasks during major incidents, emphasizing your ability to remain calm under pressure while assessing the situation, coordinating with team members, and focusing on immediate threats with a clear communication strategy.

Join Rise to see the full answer
What methods do you use for malware analysis?

Discuss the techniques you use for malware analysis, such as reverse engineering or behavioral analysis. Highlight any specific tools you’ve effectively utilized and what insights you typically look for when analyzing malware.

Join Rise to see the full answer
How do you stay current with the latest cybersecurity trends and threats?

Talk about the resources you rely on to stay informed, such as cybersecurity blogs, professional networks, and courses. Show your passion for continuous learning and how you apply that knowledge to improve security posture.

Join Rise to see the full answer
What experience do you have mentoring junior staff in your previous roles?

Provide examples of mentorship experiences, focusing on how you shared your expertise and helped junior team members develop their skills. Discuss the impact of your mentorship on team dynamics and success.

Join Rise to see the full answer
How do you handle disagreements with team members during incident response?

Highlight your conflict resolution skills, emphasizing open communication and the importance of diverse opinions in high-stakes situations. Show your ability to lead discussions that focus on shared goals and effective solutions.

Join Rise to see the full answer
Describe a time when you had to communicate technical findings to non-technical stakeholders.

Tell a story where you had to bridge the gap between technical information and business implications. Detail your approach to simplifying complex jargon while ensuring stakeholders understand the importance of security findings.

Join Rise to see the full answer
What relevant certifications do you hold that support this role?

List your relevant certifications and explain how they apply to the Deputy Incident Response Lead position. Focus on the skills and knowledge you've gained through these certifications that enhance your qualifications for the role.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Posted 5 days ago
Photo of the Rise User
Posted 4 days ago
Photo of the Rise User
Posted 6 days ago
Inetum Remote Porto, Portugal
Posted 2 days ago
Photo of the Rise User
Ness USA, Inc. Remote No location specified
Posted 7 days ago

Agile Defense's mission is to transform our government customers' organizations using Information Technology so that they can meet their mission's deadlines with efficiency and quality.

79 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
November 28, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!