Enable job alerts via email!

Incident Manager

RadiantHire Solutions, Inc.

Arlington (VA)

On-site

USD 80,000 - 120,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

An established industry player is seeking a dedicated Incident Manager to support vital cyber incident response efforts for U.S. Government agencies. This role involves managing the lifecycle of cyber incidents, coordinating with various stakeholders, and ensuring accurate reporting in case management systems. The ideal candidate will possess a strong background in cybersecurity operations, with a focus on incident management methodologies and risk evaluation. Join a mission-driven team where your expertise will contribute to national security and help protect critical assets from cyber threats. This position offers a dynamic work environment and the chance to make a significant impact.

Qualifications

  • 5+ years of experience in cyber incident management or cybersecurity operations.
  • Knowledge of incident response methodologies and NIST standards.

Responsibilities

  • Manage cyber incidents through the incident response lifecycle.
  • Create and maintain reporting of cyber incidents in official systems.
  • Coordinate with internal and external stakeholders.

Skills

Cyber Incident Management
Incident Response Methodologies
NIST 800-62
FISMA Standards
Vulnerability Recognition
Oral and Written Communication

Education

BS in Incident Management
BS in Cybersecurity
HS Diploma with relevant experience

Job description

Incident Manager - III - IMG03
Our client is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with the restoration of services. They are seeking a Cyber Action Officer to support this critical customer mission.


Responsibilities:
  1. Supporting the management of cyber incidents through the incident response lifecycle.
  2. Creating and maintaining routine reporting of cyber incidents in official systems of record, to include case management systems and ticketing.
  3. Coordinating with internal and external customers, partners, and stakeholders.
  4. Ingesting, validating, and evaluating information to determine optimal courses of action, to include providing response support to requesting entities.
  5. Updating and tracking cases and tickets with accuracy, timeliness, reliability, and consistency.
  6. Drafting summaries of ongoing operations and be able to provide oral presentations for various levels of leadership.
  7. Maintaining knowledge objects in system of record consistently and professionally.
  8. Supporting teams that apply risk management and protocols to evaluate risks and prioritize responses based on national security strategies (NCISS).
  9. Supporting teams conducting threat and vulnerability management to recognize and categorize types of vulnerabilities, threat actors, and different operational threat environments, and associated attacks (MITRE ATT&CK framework).
  10. Support teams performing network security monitoring and/or security operations analysis, system administration, operating system hardening, cyber hygiene techniques, and cybersecurity defense policies, procedures, and regulations.

Required Skills:
  1. U.S. Citizenship - Must have an active TS/SCI clearance - Must be able to obtain DHS Suitability - 5+ years of directly relevant experience in cyber incident management or cybersecurity operations
  2. Knowledge of incident response and handling methodologies.
  3. Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents.
  4. Knowledge of the NCCIC National Cyber Incident Scoring System to be able to prioritize triaging of incident.
  5. Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.).
  6. Skill in recognizing and categorizing types of vulnerabilities and associated attacks.
  7. Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]).
  8. Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code).
  9. Excellent oral and written communication skills.

Desired Skills:
  1. Familiarity with different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored]).
  2. Familiarity with system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return-oriented attacks, and malicious code).
  3. Familiarity with basic operating system hardening techniques, Computer Network Defense policies, procedures, and regulations.

Required Education:

BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with 7-9 incident management or cyber security experience.


Desired Certifications:

Security+, GCIH

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Incident Manager - III - IMG03

Solutions3 LLC

Arlington

On-site

USD 80,000 - 110,000

5 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

Ernst and Young

Wellesley

Hybrid

USD 111,000 - 208,000

Yesterday
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

EY

Memphis

On-site

USD 111,000 - 208,000

5 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

EY

Indianapolis

On-site

USD 80,000 - 120,000

6 days ago
Be an early applicant

Major Incident Manager

Cox

College Park

On-site

USD 65,000 - 99,000

3 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

Ernst and Young

Wichita

Hybrid

USD 111,000 - 208,000

6 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

Ernst and Young

Boston

Hybrid

USD 111,000 - 208,000

6 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

Ernst and Young

Minneapolis

Hybrid

USD 111,000 - 208,000

6 days ago
Be an early applicant

Data Protection and Privacy - Assistant Director (Data Risk and Incident Manager)

Ernst and Young

Dallas

Hybrid

USD 111,000 - 208,000

6 days ago
Be an early applicant