Tier 2 Incident Response Analyst - Multiple Shifts
Tyto Athene, LLC - Washington, DC
Apply NowJob Description
Here at Tyto Athene, we believe our Incident Response Analyst analysts form the backbone of our cybersecurity services. Take your career to the next level and join us as a Tier 2 Incident Response Analyst. You will play a critical role in conducting in-depth analyses and responding to incidents of potential cyber threats facing our clients. In addition to being our initial point of contact for end users, you will serve as the escalation point for junior analysts, helping guide them through more complex and high-priority incidents.One of the most critical tasks for our Tier 2 Incident Response Analyst. We provide a supportive environment for you to learn from senior SOC Incident Response Analysts, cross-train with other positions, and attend external training.Responsibilities:Utilize security tools to analyze, investigate, and triage security alertsMonitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activityPerform in-depth analysis and investigation of high-priority cybersecurity incidentsUtilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents' root causes, scope, and impactCollaborate with cyber threat hunting and cyber threat intelligence teamsParticipate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)Learn new open and closed-source investigative techniquesPerform research into emerging threats and vulnerabilities to aid their prevention and mitigationHelp shape the evolution of processes and procedures of the SOCProvide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilitiesRequired:Minimum of four (4) years of general work experience and three (3) years of relevant experience in functional responsibilityBachelor's Degree, or an equivalent combination of formal education, experienceeCPPT, OSCP, GCFW, GCIH, other relevant IT security certifications, or advanced vendor certifications such as Splunk Certified Architect or SourceFire Certified Administrator; Security+, GSEC, or other relevant IT security product certifications such as Tenable Certified Nessus Auditor, or SnortCP; CISSP, CISM, or ISO 27001.Experience in some of the following tools and technologies:Bro IDSCrowdStrike EDRFidelis XPSFireEyeRSA NetwitnessSourcefire (Snort)Splunk SIEMKnowledge of common attacker tools, techniques and procedures (TTP)Experience with major cloud service provider offeringsKnowledge of malwareKnowledge of enterprise architecture including zero trust principlesKnowledge of Windows and Unix operating systemsKnowledge of common phishing techniques and how to investigate themProficiency in technical writingAble to accurately and succinctly convey information through speaking, email, and presentationsComfortable in customer facing environmentsAbility to maintain a positive customer service mentalityDesired:Previous SOC or incident response experienceWorking knowledge of regex and scripting languagesUnderstanding how EO14028 and OMB M-21-31 impact federal SOCsAny SOC analyst relevant certifications such as those from GIAC or CompTIAThe initiative to ask for assistance and offer fresh ideas to improve the SOC's performanceClearance: Active Top Secret w/ SCI eligibility is requiredLocation: This is a hybrid role with expectations of being on the client site in Washington, DC, a few days a weekShift Types: We are always looking for the best talent to support our 24X7 operation. We have Days, Swing, and Night shifts available depending on your preference
Created: 2025-01-14