Incident Handler Cyber Security
Program Overview
About The Role
Secure Division Support. The GCC provides CSSP responsibilities and conducts DODIN Operations and DCO – Internal Defensive Measures (IDM) to protect the DODIN IAW the DoDM 8530.01 and the DoD Cybersecurity Services Evaluator Scoring Metrics (ESM). These responsibilities are broken into five (5) CSSP functions; Identify, Protect, Detect, Respond, and Recover. GCC is responsible to conduct these functions for its assigned portion of the DODIN for both unclassified and classified networks/ systems. The division provides support services for the protection, monitoring, analysis, detection, and response to unauthorized activity within the DoD Information Systems and Networks. DCO-IDM services are required to defend against unauthorized activity on all Army assets residing on the NIPRNet and SIPRNet. The division provides defensive measures to protect and defend information, computers, and networks from disruption, denial, degradation, or destruction. The division provides sensor management and event analysis and response for network and host-based events. For sensor management, the division provides management of in-line Network Intrusion Protection System/Network Intrusion Detection System (NIPS/NIDS) sensors monitoring all CONUS DoDIN-A NIPRNet and SIPRNet Enterprise traffic to detect sensor outages and activities that attempt to compromise the confidentiality, integrity, or availability of the network. In coordination with GCC Operations, DCO initiates defensive security procedures upon detection of these attacks. Event analysis and response includes the processes involved with reducing multiple cyber incidents to actual malicious threat determinations and mitigating those threats IAW guidance received from GCC Government leadership. Support the Government in providing services for CSSP services on both the NIPRNet and SIPRNet IAW Appendix E: Secure Division Workload Assessment in support of the CONUS portion of the DoDIN-A. Develop reports and products, both current and long-term, in support of CSSP and course of action development. Prepare Tactics, Techniques, and Procedures (TTP), SOPs, Executive Summary (EXSUMS), trip reports, and information/point papers. Contribute during the preparation of agreements, policy, and guidance documentation such as Memorandums of Understanding / Agreement (MOU/A), Service Level Agreements (SLA).
• Cyber Defense Operations (CDO) Support. Provide sufficient staffing to maintain on-site capability IAW PWS. Place of Work and Work Hours to work directly with GCC Operations personnel in conducting initial triage/cyber incident analysis to include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-incident response ticket, making an initial determined category of cyber incident (IAW Chairman of the Joint Chiefs of Staff Manual (CJCSM) 6510), and/or notifying DCO/ARCYBER/Higher Headquarters IAW Commander’s Critical Information Requirements (CCIR) reporting requirements. All other CDO operations must have an on-call capability to take actions as required to respond to cyber incidents IAW policy and/or Government direction.
• Incident Analysis and Mitigation. Provide incident analysis and mitigation support by conducting incident analysis and recommending mitigation measures in response to general or specific Advanced Persistent Threats (APT), (attempted exploits/attacks, malware delivery, etc.) on Army networks.
• Block/deny access by hostile sites or restrict access by specific ports/protocols and/or applications.
• Provide recommendations to the supporting operations and maintenance organization to take necessary action where the CSSP-D Division does not administratively control the sensor grid.
• Provide justification of IDMs and/or operational impact (implied or accepted risk) to a Configuration Control Board (CCB) and/or Authorizing Official (AO), as required, for mitigation action (IDM) approval. If deemed appropriate (or as requested), the internal defensive measure may involve coordination of a Network Damage Assessment (NDA), Network Assistance Visit (NAVs), or other version of the Computer Defense Assistance Program (CDAP) mission.
• Monitor all sensors and agents managed by the GCC for security event analysis and response and maintain/update the triage database with current threat data and response methods in real-time with follow-up recurring within 72 hours of last response. The Contractor shall respond to a detected event and perform triage, ensure proper handling of the associated trouble ticket (TT), and process events accordance with appropriate TTPs.
• Provide all initial cyber incident reports to Law Enforcement and Counterintelligence (LE/CI) agencies and:
• Maintain an up-to-date POC list for LE/CI agencies as routinely provided by the Major Cybercrimes Unit (MCU) and Cyber Counterintelligence agencies.
• In cases where an active investigation will be opened, LE/CI agencies will provide written request that will include the official case number, specific data logs, and other required information IAW local TTPs.
• Provide support and expertise include the provision of the required data along with a summary or analysis of the data. Data and answers provided in the analysis shall pertain specifically to requirements in the LE/CI official request or within CSSP-D TTPs.
• Provide all initial cyber incident investigation reports to LE/CI.
• Maintain a Master Station Log (MSL) to document high visibility cyber incidents, defined as events identified in an ARCYBER Task Order, a Named Operation, or a Category 1 (CAT1), with status, discuss DCO topics, share internal tasks between shifts, document call outs, and share any additional relevant instructions between shifts and up through GCC Leadership and Operations reporting channels. The MSL must be available for Government inspection at any given time to ensure accurate tracking of the above information.
Qualifications
Basic Qualifications:
- 0 years with BS/BA; 4 years no degree
- Certifications: Certified Authorization Professional (CAP) OR meets current DCWF qualification requirements DCWF Code: 722 - Advanced: Certified Information Security Manager (CISM) or Certified Information Systems Security Officer (C)ISSO) or Certified Information Systems Security Professional (CISSP) or Federal IT Security Professional-Manager-NG (FITSP-M) or GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) or GIAC Cloud Security Automation (GCSA) or GIAC Global Industrial Cyber Security Professional (GICSP) or GIAC Security Essentials Certification (GSEC) or GIAC Security Leadership Certification (GSLC) or Information Systems Security Management Professional (ISSMP).
AND DCWF code 531 Intermediate: Certified Cloud Security Professional (CCSP) or Certified Ethical Hacker (CEH) or Cisco Certified CyberOps Associate or CompTIA Cloud+ or CompTIA PenTest+ or CompTIA Security+ or Federal IT Security Professional-Operator-NG (FITSP-O) or GIAC Certified Enterprise Defender (GCED) or GIAC Information Security Fundamentals (GISF). - Experience collecting and analyzing event information and performing threat or target analysis.
- Experience supporting operations related to persistent monitoring on a 24/7 basis of all designated networks, enclaves, and systems.
- Demonstrated competence in managing and executing first-level responses and addressing reported or detected incidents.
- Comfort level with reporting to and coordinating with external organizations and authorities.
- Background in coordinating and distributing directives, vulnerability, and threat advisories to identified consumers.
- U.S. citizenship required.
- Possess a Secret security clearance with the ability to qualify for a Top Secret with SCI Security Clearance.
- Ability to work shift hours.
SCA / Union / Intern Rate or Range
Details
Target Salary Range: $51,000 - $82,000. This represents the typical salary range for this position. Salary is determined by various factors, including but not limited to, the scope and responsibilities of the position, the individual’s experience, education, knowledge, skills, and competencies, as well as geographic location and business and contract considerations. Depending on the position, employees may be eligible for overtime, shift differential, and a discretionary bonus in addition to base pay.
EEO: Equal opportunity employer, including disability and protected veterans, or other characteristics protected by law.
Recommended Jobs
SAFETY & COMPLIANCE SPECIALIST
Job Description Job Description We are seeking a dedicated and knowledgeable Safety Professional to join our team. The ideal candidate will possess a strong foundation in workplace safety and hea…
Customer Service Representative
Job Description Job Description Who We Are Bakkt is a trusted digital asset platform that enables consumers to buy, sell, store, send and spend digital assets. Bakkt’s platform, is available…
Lead Business Systems Analyst
Job Description Job Description LOOKING FOR ONLY ARIZONA RESIDENTS within commuting distance to downtown Phoenix, AZ. City of Phoenix - Lead Business Systems Analyst 145086 (Hybrid position …
Tree Trimming Assistant/Groundsman
Job Description Job Description Benefits: ~401(k) matching ~ Company parties ~ Dental insurance ~ Health insurance ~ Paid time off Tree Trimming Assistant/Groundsman Overview: …
Director of Data and Business Intelligence, Need Python - Work From Home
Director of Data and Business Intelligence, Need Python – Work From Home This is a 100% Remote Director of Data and Business Intelligence opportunity. As the Director of Data and BI, you will b…
Fire Alarm Devising
Job Description PeopleReady Skilled Trades (PRST) is currently looking for Fire Alarms devising experience commercial construction project in Glendale Arizona. As an experienced Fire Alarms devisi…
Behavioral Health Licensed Clinician
Job Description Job Description Key Responsibilities: Meeting with clients to provide behavioral health support, including documentation, charting, policy and process development, quality improve…
Travel: RN PCU | AZ
Job Description Job Description Location: Tucson, AZ Schedule: Night Shift (7:00 PM – 7:30 AM) | 3/12-hour shifts per week Weekend Requirement: 6 weekend shifts per 6-week schedule St…
Supervisor Electrical & Instrumentation
Job Description Job Description We offer Competitive Pay, Great Benefits, and Opportunities for Growth. Pinto Valley Mining Corporation (PVMC), a subsidiary of Capstone Mining, is a global lea…
Seasonal Camp Counselor
Picture a shimmering oasis overlooking the Sonoran Desert and the McDowell mountains - Fairmont Scottsdale Princess offers luxury and world class hospitality with over 300,000 square feet of meet…