Let’s get started
By clicking ‘Next’, I agree to the Terms of Service
and Privacy Policy
Jobs / Job page
Cybersecurity Analyst Lead (Incident Response) image - Rise Careers
Job details

Cybersecurity Analyst Lead (Incident Response)

Department Marketing Statement: The Washington Metropolitan Area Transit Authority (Metro) is developing an advanced cybersecurity program to protect the critical transit infrastructure serving our nation's capital. We are seeking a Cybersecurity Analyst Lead (Incident Response) to join our Cyber Fusion Center, reporting to the Center's Manager. This role involves continuous monitoring, investigation, and remediation of security events using various tools to detect and mitigate potential threats, ensuring the safety and resilience of our infrastructure. The Cybersecurity Analyst Lead (IR) will develop and follow processes for threat detection and response, optimize SIEM rules, alerts, and other security tools to enhance visibility and improve incident response. Additionally, they will provide leadership and mentorship to junior analysts to enhance the incident response team's skill set. The role also includes creating new playbooks to optimize automation workflows as needed and managing the proactive detection of threats by importing Indicators of Compromise (IOCs) into monitoring tools and capturing relevant data to support security operations. The position requires participation in on-call duties to ensure rapid response to security incidents at any time.As part of a collaborative fusion program, the Cybersecurity Analyst Lead will work closely with teams across incident response, threat intelligence, and conduct threat hunting activities to identify suspicious activities within the WMATA enterprise. They will apply a deep understanding of the incident response process to various tools like SIEM, IDS/IPS, EDR systems, and cloud environments, and perform behavioral analysis to identify insider threats. Conducting root cause analysis to understand the origin and spread of incidents, providing valuable insights for improved security measures, is also a key responsibility. The ideal candidate will have extensive experience in incident response and cybersecurity, strong leadership and mentorship skills, proficiency with SIEM, IDS/IPS, EDR systems, and cloud environments, and the ability to develop and optimize security playbooks and automation workflows. Excellent analytical and problem-solving skills are essential for this role.General Hybrid Work Statement:This opportunity is a hybrid opportunity allowing for flexibility between virtual and in-person work subject to the Authority's telework policy.Minimum QualificationsEducation• A Bachelor's degree from an accredited college or universityExperience• Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role postedPreferredEducation• A Bachelor's Degree in Computer Science, Cybersecurity or a related technical fieldMedical GroupSatisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations.SummaryThe Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats.Essential Functions• Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated.• Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated.• Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats.• Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture.• Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program.• Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats.• Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs).• Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats.• Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsels Office) and external (e.g., law enforcement agencies, vendors, public relations professionals).• Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated.• Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices.• Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices.• Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat.• Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems.The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision.Evaluation CriteriaConsideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience.Evaluation criteria may include one or more of the following:• Skills and/or behavioral assessment• Personal interview• Verification of education and experience (including certifications and licenses)• Criminal Background Check (a criminal conviction is not an automatic bar to employment)• Medical examination including a drug and alcohol screening (for safety sensitive positions)• Review of a current motor vehicle reportClosingWMATA is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other status protected by applicable federal law.This posting is an announcement of a vacant position under recruitment. It is not intended to replace the official job description. Job descriptions are available upon confirmation of an interview.
Washington Metropolitan Area Transit Authority Glassdoor Company Review
3.6 Glassdoor star iconGlassdoor star iconGlassdoor star icon Glassdoor star icon Glassdoor star icon
Washington Metropolitan Area Transit Authority DE&I Review
No rating Glassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star iconGlassdoor star icon
CEO of Washington Metropolitan Area Transit Authority
Washington Metropolitan Area Transit Authority CEO photo
Paul J. Wiedefeld
Approve of CEO

Average salary estimate

$105000 / YEARLY (est.)
min
max
$90000K
$120000K

If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.

What You Should Know About Cybersecurity Analyst Lead (Incident Response), Washington Metropolitan Area Transit Authority

The Washington Metropolitan Area Transit Authority (WMATA) is on the lookout for a talented Cybersecurity Analyst Lead (Incident Response) to join our innovative Cyber Fusion Center in Virginia. This isn't just any cybersecurity role; it's an opportunity to safeguard the critical infrastructure that keeps our nation's capital running smoothly every day. In this pivotal position, you'll be at the forefront of continuously monitoring, investigating, and remediating security events. Leveraging a variety of cutting-edge tools to detect and neutralize potential threats is just the beginning. As the Cybersecurity Analyst Lead, you'll play a key role in shaping our threat detection processes, fine-tuning SIEM rules, and creating new automation workflows to streamline operations. You’ll mentor junior analysts, guiding them to enhance their skills and confidence in incident response. Your expertise will be invaluable as you conduct threat hunting activities, analyze suspicious behaviors, and apply your deep understanding of incident response tools across various environments like SIEM, IDS/IPS, and the cloud. Furthermore, your ability to perform root cause analyses will not only help us understand the origins of incidents but also improve our security measures. If you're ready to take on on-call duties, lead a proactive detection team, and positively impact the safety of our public transit system, we would love for you to apply and join our dedicated team at WMATA.

Frequently Asked Questions (FAQs) for Cybersecurity Analyst Lead (Incident Response) Role at Washington Metropolitan Area Transit Authority
What qualifications are needed to apply for the Cybersecurity Analyst Lead (Incident Response) position at WMATA?

To apply for the Cybersecurity Analyst Lead (Incident Response) position at WMATA, candidates should possess a bachelor's degree from an accredited college or university. Additionally, six years of relevant experience in cybersecurity roles such as a cybersecurity officer or engineer is required. Preferred qualifications include a degree in Computer Science, Cybersecurity, or a related technical field, and extensive knowledge of incident response processes and tools.

Join Rise to see the full answer
What are the primary responsibilities of the Cybersecurity Analyst Lead (Incident Response) at WMATA?

The Cybersecurity Analyst Lead (Incident Response) at WMATA is responsible for continuous monitoring and remediation of security events, optimizing incident response tools, and developing playbooks. The role involves leading the incident response team, conducting threat hunting activities, and performing root cause analyses of security incidents to improve overall cybersecurity measures.

Join Rise to see the full answer
How does WMATA support the professional development of the Cybersecurity Analyst Lead (Incident Response)?

WMATA emphasizes professional development for the Cybersecurity Analyst Lead (Incident Response) role by providing opportunities for mentorship, skill enhancement, and collaboration across various cyber disciplines. The position also allows for involvement in advanced cybersecurity programs and the potential to lead projects that impact team and organizational growth.

Join Rise to see the full answer
What tools does the Cybersecurity Analyst Lead (Incident Response) at WMATA work with?

In the Cybersecurity Analyst Lead (Incident Response) position at WMATA, you'll work with a variety of cybersecurity tools including SIEM, IDS/IPS, EDR systems, and cloud environments. Your role will involve optimizing these tools for enhanced visibility and effective incident responses, ensuring that the WMATA infrastructure remains secure.

Join Rise to see the full answer
What type of work environment can a Cybersecurity Analyst Lead (Incident Response) expect at WMATA?

WMATA offers a hybrid work environment for the Cybersecurity Analyst Lead (Incident Response). This setup allows for flexibility between virtual and in-person work while adhering to the Authority's telework policy. You’ll be part of a collaborative team that plays a crucial role in maintaining the safety of our public transit infrastructure.

Join Rise to see the full answer
Common Interview Questions for Cybersecurity Analyst Lead (Incident Response)
Can you describe your experience with incident response processes?

When responding to this question, highlight specific cases where you've led incident response initiatives. Discuss any frameworks you've used, the tools involved, and the outcomes of your actions. This showcases not only your technical ability but also your leadership skills in managing incidents effectively.

Join Rise to see the full answer
What strategies do you use for threat detection and monitoring?

In your response, outline the specific tools and techniques you've implemented for threat detection. Include examples of how you optimized SIEM rules or used behavioral analysis to detect insider threats. Be sure to mention collaboration with other teams to emphasize a holistic approach.

Join Rise to see the full answer
How do you stay updated with the latest cybersecurity threats and trends?

Discuss resources you rely on, such as industry publications, forums, or professional organizations. Mention any training, certifications, or workshops you participate in to enhance your knowledge. This demonstrates your commitment to continuous learning, which is crucial in the fast-paced cybersecurity field.

Join Rise to see the full answer
Describe a time when you had to lead a team during a cybersecurity incident.

When answering this question, narrate a situation that highlights your leadership and communication skills. Discuss your approach to managing stress, delegating tasks, and ensuring all team members were aligned and informed during the crisis. Highlight the importance of teamwork in incident response.

Join Rise to see the full answer
What are your methods for conducting a root cause analysis?

Provide a step-by-step description of your root cause analysis process. Emphasize the importance of thorough data examination, consideration of all possible factors, and documenting findings. This showcases your analytical skills and your commitment to improving security practices.

Join Rise to see the full answer
How do you handle on-call duties and manage stress during incidents?

Share your strategies for managing on-call duties, such as maintaining a clear escalation protocol and prioritizing tasks by severity. Discuss stress-management techniques you've found effective, such as maintaining open communication with your team and ensuring a debrief after incidents.

Join Rise to see the full answer
Can you give an example of how you've optimized security playbooks?

When responding, provide a detailed example of a playbook you've optimized, including the challenges faced, the modifications made, and the results post-optimization. Showcase how your efforts improved incident response efficiency or reduced response times.

Join Rise to see the full answer
What do you see as the biggest challenge facing cybersecurity today?

Express your perspective on current cybersecurity challenges, such as advanced persistent threats or insider threats. Discuss your approach to addressing these challenges, and consider mentioning the importance of proactive measures and continuous monitoring.

Join Rise to see the full answer
How do you evaluate the effectiveness of a cybersecurity program?

Talk about the metrics you use to evaluate program effectiveness, such as incident response times, false positive rates, or employee training completion rates. Emphasize the importance of ongoing assessments and making data-driven decisions to improve security posture.

Join Rise to see the full answer
Why do you want to work as a Cybersecurity Analyst Lead (Incident Response) at WMATA?

Show your enthusiasm for the position by connecting your values to WMATA's mission. Discuss your desire to contribute to the safety of public transportation, along with how your experience aligns with the role's requirements. This personal touch will resonate with interviewers.

Join Rise to see the full answer
Similar Jobs
Photo of the Rise User
Capital One Remote Rising Sun-Lebanon, DE
Posted 12 days ago
Photo of the Rise User
Garmin Cluj Remote No location specified
Posted 9 days ago
Photo of the Rise User
Posted 8 days ago
Dare to be Different
Diversity of Opinions
Inclusive & Diverse
Collaboration over Competition
Fast-Paced
Growth & Learning
Photo of the Rise User
Posted 8 days ago

Washington Metropolitan Area Transit Authority (WMATA or the Metro) operates the second largest rail transit system (Metrorail) and one of the largest bus networks (Metrobus) in the US. Transporting roughly a third of federal government employees ...

10 jobs
MATCH
Calculating your matching score...
FUNDING
SENIORITY LEVEL REQUIREMENT
TEAM SIZE
EMPLOYMENT TYPE
Full-time, hybrid
DATE POSTED
December 15, 2024

Subscribe to Rise newsletter

Risa star 🔮 Hi, I'm Risa! Your AI
Career Copilot
Want to see a list of jobs tailored to
you, just ask me below!