[Remote] Jr. Cyber Incident Analyst

Note: The job is a remote job and is open to candidates in USA. ECS is a leading mid-sized provider of technology services to the United States Federal Government, seeking a Jr. Cyber Incident Analyst to support the Cybersecurity and Infrastructure Security Agency’s (CISA) Joint Cyber Defense Collaborative (JCDC). The role involves providing deep technical analysis during active cyber incidents, offering insights into vulnerabilities and adversarial tactics, and working closely with various stakeholders to enhance threat hunting and incident response capabilities.


Responsibilities

  • Perform analysis on active cyber incidents, events and vulnerabilities to provide guidance and targeted recommendations for mitigation
  • Support the development of written guidance and recommendations to assist JCDC partners with solutions for active and ongoing cyber vulnerabilities
  • Through hands-on analysis provide insights into vulnerabilities, adversarial tactics, and mitigation strategies across diverse environments like IT, OT/ICS, cloud, and AI systems
  • Support a team in the translation of strategic products into clear, practical formats that are tailored to the specific needs and operational constraints of different stakeholder groups, including large and small jurisdictions and critical infrastructure (CI) partners
  • Assist in the tailoring of vulnerability mitigation recommendations and contextualized examples to stakeholders to address implementation challenges and encourage rapid adoption

Skills

  • US Citizenship and the ability to obtain and maintain a minimum of DHS (Suitability) EOD/ Public Trust
  • 3+ Years of previous experience in a threat intelligence, cyber security, incident response, or similar role
  • General understanding of computer and network fundamentals
  • Basic understanding of computer architecture, operating systems, vulnerabilities, encryption, or other areas of expertise
  • Experience defining data sources and writing detection rules for discovering malicious behavior
  • Ability to assist with in-depth research tasks and produce written summaries to include insights and predictions based on an analytical process
  • Excellent written and oral communication skills
  • General understanding of current cyber threats/exploits, attack methodology, and detection techniques using a wide variety of security products including COTS and open source
  • Familiarity with the .gov Cyber Mission space and legal constraints applicable to civilian Government Agencies (e.g., FISMA)
  • Experience collecting, analyzing, and categorizing threat intelligence data from multiple sources to author actionable intelligence reports
  • Familiarity with at least one scripting language such as Python, and capable of manipulating data, interfacing with APIs, automating repetitive tasks, etc.
  • Ability to interpret complex cybersecurity topics and effectively communicate or present information to various groups of stakeholders (Executives, SOC, etc.)
  • Field-related certifications such as (CTIA, CEH, GREM, GCIH, GCFA)
  • Experience with tools in both Linux and Windows environments
  • Experience applying AI/ML to identify anomalous behavior in security data, esp. using Elasticsearch
  • Familiarity with MITRE ATT&CK and/or similar frameworks
  • Familiarity with AI/ML concepts and applications
  • Possess a TS security clearance and be SCI eligible
  • DHS Entry on Duty (EOD) clearance

Benefits

  • US Citizenship and the ability to obtain and maintain a minimum of DHS (Suitability) EOD/ Public Trust

Company Overview

  • ECS is a fast-growing 4,000-person, $1.2B provider of advanced technology solutions for federal civilian, defense, intelligence, and commercial customers. It was founded in 2001, and is headquartered in Fairfax, Virginia, USA, with a workforce of 1001-5000 employees. Its website is https://www.ecstech.com.

  • Back to blog