Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: REMOTE WORK, AL
Career Level: Associate
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is seeking multiple, Fully Remote, Cyber Incident Response Analyst's to support the US Army Corps of Engineers (USACE) Revolutionary IT Services (RITS) program to identify and respond to cyber incidents, while collecting evidence, removing malware, rebuilding systems from compromises, and update anti-virus on systems.

NOTE: This is a 100% Fully Remote / Work from Home position.

This position will require shift work, must be able to accommodate any shift. 

JOB DESCRIPTION:

  • Providing analysis and monitoring for all systems and environments to ensure the availability, integrity, and confidentiality of the data processed, stored, and transmitted via a centralized support monitoring service
  • Providing continuous monitoring of malware protection and detection mechanisms
  • Providing active monitoring of the operational status, health, and performance of the monitoring tools and devices
  • Analyzing the information provided and providing recommendations for inclusion into the CorpsNet, and SIPRNet environments, while maintaining the classification of information
  • Providing performance measurements, logs, and information feeds from the security monitoring systems (e.g., HBSS and IPS)
  • Maintaining access to current network architecture diagrams per DISA standards showing placement of sensors (e.g., IDS/IPS, Routers, Netflow/PCAP systems, firewall, etc.)
  • Reporting on access to assets, including, but not limited to, network and host-based sensors for CorpsNet, CorpsNet extended network (JRSS and cloud), and SIPRNet
  • Integrating and correlating data from USACE systems, servers, services, SIEM, and end points to measure, monitor, remediate, and remove threats to the environment in accordance with USACE OCIO/G-6 directives

Qualifications

REQUIRED EDUCATION AND EXPERIENCE:

  • Bachelor's and five (5) years or more experience; additional four (4) years of experience accepted in lieu of degree
  • Experience monitoring and identifying cyber threats on Windows and Linux operating systems
  • Experience using security monitoring systems such as End Point Detection and Response (EDR)
  • Familiar with basic networking protocols
  • Must be able to accommodate any of the three required shifts during weekdays and weekends such as: 
    • 1st shift: 8:00am - 4:00pm EST
    • 2nd shift: 4:00pm - 12:00am EST
    • 3rd shift:12:00am - 8:00am EST
    • 12hr shifts on Saturday and Sunday about once every two months

REQUIRED CLEARANCE:

  • Must be able to obtain a full Secret Clearance; Interim Secret required prior to start, SAIC will help to obtain
  • Must be a current US Citizen

REQUIRED CERTIFICATION:

  • Must have any one of the following CSSP-Incident Responder certifications:
    • CEH – Certified Ethical Hacker
    • CySA+ - Cybersecurity Analyst Plus
    • CFR - CyberSec First Responder
    • Cloud+
    • PenTest+

Target salary range: $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.
Covid Policy: SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.


 Apply on company website