Overview
Working across the globe, V2X builds smart solutions designed to integrate physical and digital infrastructure from base to battlefield. We bring 120 years of successful mission support to improve security, streamline logistics, and enhance readiness. Aligned around a shared purpose, our $3.9B company and 16,000 people work alongside our clients, here and abroad, to tackle their most complex challenges with integrity, respect, responsibility, and professionalism.
The Defensive Cyber Operations (DCO) division within the USARCC-SWA is looking for a candidate with strong scripting abilities, experience with systems security administration, and network security technologies. The Incident Response Analyst will design, implement, automate, maintain, and optimize measures protecting systems, networks, and information. Program: OMDAC-SWACA
This position offers company-paid housing and transportation, a completion bonus and tuition reimbursement program!
You must satisfy all host country requirements to legally work in the host country in order to be qualified for this position.
Responsibilities
Detect, document, and report potential or confirmed incidents and security issues.
Analyze events utilizing Security Information Event Management (SIEM) systems, Big Data Analytics, and other supporting platforms or applications.
Conduct Incident Handling actions in accord to established procedures.
Staff, coordinate and perform Incident Response investigations.
Conduct quality control of incidents and investigations to maintain compliance with applicable policies.
Develop recommendations to enhance detection capabilities and implement mitigation measures in response to general or specific threats (attempted exploits, attacks, malware delivery, etc.).
Design and integrate custom rules and reports within data collection platforms. Prepare technical summaries and briefings.
Provide technical expertise regarding the defense of information systems and networks.
Correlate event data to create situational awareness and trend analysis reports.
The work environment will be 95% indoor and 5% outdoor.
Perform additional duties as assigned.
Qualifications
Qualifications:
Education / Certifications: One year of related experience may be substituted for one year of education, if degree is required.
Associate Degree or equivalent experience preferably in Computer Science or MIS, IS, Engineering or related field.
This position requires candidates to adhere to DoD 8570.01. All candidates are required to maintain at least one (1) baseline certification and one (1) computing environment (CE) certification. Baseline certifications cannot also be used as a Computing Environment (CE) certification. The authorized certifications for this job title are listed as follows:
IAT Level: CSSP Incident Responder
BASELINE:
Cisco: CCNA CyberOps
Cisco: CCNA Security
Cisco: SCYBER: Cybersecurity Specialty Certification
CompTIA: CySA+ ce: Cybersecurity Analyst
CompTIA: PenTest
CyberSec: CFR: First Responder EC-Council CEH: Certified Ethical Hacker
EC-Council: CHFI: Certified Hacking Forensic Investigator
GIAC: GCFA: Certified Forensic Analyst: Certified Forensic Analyst
GIAC: GCIH: Certified Incident Handler
COMPUTING ENVIRONMENT (CE):
Cisco: CCNP: Certified Network Professional (Any)
EC Council: ECIH: Certified Incident Handler
GIAC: GCFA: Certified Forensic Analyst
GIAC: GCIA: Certified Intrusion Analyst
GIAC: GCIH: Certified Incident Handler (preferred)
GIAC: GCWN: Certified Windows Security Administrator
GIAC: GDAT: Defending Advanced Threats
GIAC: GREM: Reverse Engineering Malware
GIAC: GSEC: Security Essentials
Microsoft: 365 Certified: Enterprise Administrator Expert
Microsoft: Certified: Azure Security Engineer Associate
Microsoft: Certified: Azure Solutions Architect Expert
Microsoft: MCSE: Core Infrastructure
Microsoft: MCSE: Database Management and Analytics
Microsoft: MCSE: Productivity Solutions Expert
Offensive Security: Certified Expert
Offensive Security: Certified Professional
Experience: One year of related academic study above the high school level may be substituted for one year of experience up to a maximum of a 4-year bachelor's degree in a Business Information Systems discipline for three years general experience.
At least five (3) years of practical experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security incident handling and SIEM event analysis.
Experience with a customer service-oriented company
We are committed to an inclusive and diverse workplace that values and supports the contributions of each individual. This commitment along with our common Vision and Values of Integrity, Respect, and Responsibility, allows us to leverage differences, encourage innovation and expand our success in the global marketplace. Vectrus is an Equal Opportunity /Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, age, sex, national origin, protected veteran status or status as an individual with a disability. EOE/Minority/Female/Disabled/Veteran.