Enable job alerts via email!

Cyber Incident Response Analyst

Saic

Chicago (IL)

Remote

USD 40,000 - 80,000

Full time

2 days ago
Be an early applicant

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

SAIC is seeking a Cyber Incident Response Analyst to enhance cybersecurity monitoring from a remote location. This role is essential for analyzing system integrity and protecting data confidentiality, requiring specific educational qualifications and cybersecurity certifications.

Qualifications

  • Bachelor's degree and two years of experience, or four years of experience in lieu of degree.
  • Required interim Secret clearance.

Responsibilities

  • Monitor and analyze systems to ensure data integrity and confidentiality.
  • Provide continuous malware protection monitoring.
  • Report on access to assets including network and host-based sensors.

Skills

Malware protection
Data analysis
Cybersecurity monitoring

Education

Bachelor's degree or equivalent experience

Job description

Job ID: 2506696
Location: REMOTE WORK, AZ, United States
Date Posted: Jun 17, 2025
Category: Cyber
Subcategory: Cybersecurity Spec
Schedule: Full-time
Shift: Day Job
Travel: No
Minimum Clearance Required: Interim Secret
Clearance Level Must Be Able to Obtain: Secret
Potential for Remote Work: Remote
Benefits: Click here

SAIC is seeking a Cyber Incident ResponseAnalystto be a critical member of the RITS team providing remote customer support.

This role offers work from home / remote / virtual work at home.

Responsibilities Include:

  • Providing analysis and monitoring for all systems and environments to ensure the availability, integrity, and confidentiality of the data processed, stored, and transmitted via a centralized support monitoring service. Analysis and monitoring shall be automated to the maximum extent possible.
  • Providing continuous monitoring of malware protection and detection mechanisms.
  • Providing administrator access to the designated Government POCs as required.
  • Providing active monitoring of the operational status, health, and performance of the monitoring tools and devices.
  • Actively monitoring vendor feeds, Army feeds, tippers, OPORDS, sensor grids, and intelligence feeds for new signature information.
  • Analyzing the information provided and providing recommendations for inclusion into the CorpsNet, and SIPRNet environments, while maintaining the classification of information.
  • Providing performance measurements, logs, and information feeds from the security monitoring systems (e.g., HBSS and IPS).
  • Maintaining access to current network architecture diagrams per DISA standards showing placement of sensors (e.g., IDS/IPS, Routers, Netflow/PCAP systems, firewall, etc.).
  • Reporting on access to assets, including, but not limited to, network and host-based sensors for CorpsNet, CorpsNet extended network (JRSS and cloud), and SIPRNet.
  • Integrating and correlating data from USACE systems, servers, services, SIEM, and end points to measure, monitor, remediate, and remove threats to the environment in accordance with USACE OCIO/G-6 directives.

Qualifications

Required Education and Experience:

  • Bachelors and two (2) years or more experience; OR Masters and 0 years of experience; OR four (4) years of experience accepted in lieu of degree.

Required Clearance:

  • Must have anInterim Secret clearance with ability to obtain and maintain a Secret clearance.

Required Certification:Must have any one of the following CSSP-IR (CyberSecurity Service Provider-Incident Responder) certifications:

  • CEH – Certified Ethical Hacker.
  • CySA+ - Cybersecurity Analyst Plus.
  • CCNA-Security.
  • CHFI - Computer Hacking Forensic Investigator.
  • GCFA - GIAC Certified Forensic Analyst.
  • SCYBER.
  • PenTest+.
Job Description

Description

SAIC is seeking a Cyber Incident ResponseAnalystto be a critical member of the RITS team providing remote customer support.

This role offers work from home / remote / virtual work at home.

Responsibilities Include:

  • Providing analysis and monitoring for all systems and environments to ensure the availability, integrity, and confidentiality of the data processed, stored, and transmitted via a centralized support monitoring service. Analysis and monitoring shall be automated to the maximum extent possible.
  • Providing continuous monitoring of malware protection and detection mechanisms.
  • Providing administrator access to the designated Government POCs as required.
  • Providing active monitoring of the operational status, health, and performance of the monitoring tools and devices.
  • Actively monitoring vendor feeds, Army feeds, tippers, OPORDS, sensor grids, and intelligence feeds for new signature information.
  • Analyzing the information provided and providing recommendations for inclusion into the CorpsNet, and SIPRNet environments, while maintaining the classification of information.
  • Providing performance measurements, logs, and information feeds from the security monitoring systems (e.g., HBSS and IPS).
  • Maintaining access to current network architecture diagrams per DISA standards showing placement of sensors (e.g., IDS/IPS, Routers, Netflow/PCAP systems, firewall, etc.).
  • Reporting on access to assets, including, but not limited to, network and host-based sensors for CorpsNet, CorpsNet extended network (JRSS and cloud), and SIPRNet.
  • Integrating and correlating data from USACE systems, servers, services, SIEM, and end points to measure, monitor, remediate, and remove threats to the environment in accordance with USACE OCIO/G-6 directives.

Qualifications

Required Education and Experience:

  • Bachelors and two (2) years or more experience; OR Masters and 0 years of experience; OR four (4) years of experience accepted in lieu of degree.

Required Clearance:

  • Must have anInterim Secret clearance with ability to obtain and maintain a Secret clearance.

Required Certification:Must have any one of the following CSSP-IR (CyberSecurity Service Provider-Incident Responder) certifications:

  • CEH – Certified Ethical Hacker.
  • CySA+ - Cybersecurity Analyst Plus.
  • CFR - CyberSec First Responder.
  • CCNA Cyber Ops - (Cisco Certified Network Associate).
  • CCNA-Security.
  • CHFI - Computer Hacking Forensic Investigator.
  • GCFA - GIAC Certified Forensic Analyst.
  • GCIH - GIAC Certified Incident Handler.
  • SCYBER.
  • PenTest+.

Target salary range: $40,001 - $80,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.


Overview

SAIC accepts applications on an ongoing basis and there is no deadline.

SAIC is a premier Fortune 500 mission integrator focused on advancing the power of technology and innovation to serve and protect our world. Our robust portfolio of offerings across the defense, space, civilian and intelligence markets includes secure high-end solutions in mission IT, enterprise IT, engineering services and professional services. We integrate emerging technology, rapidly and securely, into mission critical operations that modernize and enable critical national imperatives.

We are approximately 24,000 strong; driven by mission, united by purpose, and inspired by opportunities. SAIC is an Equal Opportunity Employer. Headquartered in Reston, Virginia, SAIC has annual revenues of approximately $7.5 billion. For more information, visit saic.com . For ongoing news, please visit our newsroom .

Please apply through the internal career site here >

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Cyber Incident Response Analyst

Lensa

null null

Remote

Remote

USD 40,000 - 80,000

Full time

4 days ago
Be an early applicant

Cyber Incident Response Analyst

Lensa

null null

Remote

Remote

USD 40,000 - 80,000

Full time

5 days ago
Be an early applicant

Incident Response Analyst

Softswiss

null null

Remote

Remote

USD 70,000 - 100,000

Full time

3 days ago
Be an early applicant

Junior Incident Response Consultant

Pondurance

McLean null

Remote

Remote

USD 60,000 - 80,000

Full time

6 days ago
Be an early applicant

Incident Response Analyst (Remote, ROU)

CrowdStrike

null null

Remote

Remote

USD 70,000 - 100,000

Full time

22 days ago