(Cyber) Incident Management Analyst
2 weeks ago
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' most demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets.
Nightwing is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist with the restoration of services. Nightwing is seeking a Cyber Incident Manager to support this critical customer mission.
Responsibilities:
- Correlating incident data to identify specific trends in reported incidents
- Recommending defense in depth principles and practices (i.e. Defense in Multiple Places, layered defenses, security robustness, etc.)
- Performing Computer Network Defense incident triage to include determining scope, urgency, and potential impact
- Researching and compiling known resolution steps or workarounds to enable mitigation of potential Computer Network Defense incidents within the enterprise
- Applying cybersecurity concepts to the detection and defense of intrusions into small, and large-scale IT networks, and conduct cursory analysis of log data
- Monitoring external data sources to maintain currency of Computer Network Defense threat condition and determine which security issues may have an impact on the enterprise
- Identifying the cause of an incident and recognizing the key elements to ask external entities when learning the background and potential infection vector of an incident,
- Receiving and analyzing network alerts from various sources within the enterprise and determine possible causes of such alerts
- Tracking and documenting Computer Network Defense (CND) incidents from initial detection through final resolution, and work with other components within the organization to obtain and coordinate information pertaining to ongoing incidents
- Limited candidates may be hired for shift work; assigned to set schedules, triaging and researching incidents for Indicators of Compromise (IOCs), escalating to specialized analysts
Required Skills:
- U.S. Citizenship
- Must have an active TS/SCI clearance
- Must be able to obtain DHS Suitability
- 5+ years of directly relevant experience in cyber incident management or cybersecurity operations
- Knowledge of incident response and handling methodologies
- Having close familiarity with NIST 800-62 (latest revision), and FISMA standards as they pertain to reporting incidents
- Ability to prioritize incidents, investigate and describe tactics used in phishing campaigns, as well as recognize gaps in incident reporting
- Knowledge of general attack stages (e.g., foot printing and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks, etc.)
- Skill in recognizing and categorizing types of vulnerabilities and associated attacks
- Knowledge of basic system administration and operating system hardening techniques, Computer Network Defense policies, procedures, and regulations
- Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored])
- Knowledge of system and application security threats and attack methods (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code)
Desired Skills:
- Knowledge of different operational threat environments (e.g., first generation [script kiddies], second generation [non nation-state sponsored], and third generation [nation-state sponsored])
- Knowledge of system and application security threats and attack methods (e.g., buffer overflow, mobile code, cross-site scripting, PL/SQL and injections, race conditions, covert channel, replay, return- oriented attacks, and malicious code)
Required Education:
BS Incident Management, Operations Management, Cybersecurity or related degree. HS Diploma with 7-9 incident management or cyber security experience
Desired Certifications:
GCIH, GCFA GISP, GCED, CCFP or CISSP
Arlington, VA
Previously part of a leading Fortune 100 company and headquartered in Dulles, VA; Nightwing became independent in 2024 but continues to support the nation's most mission impactful initiatives.
When we formed Nightwing, we brought a deep set of credentials and an unfaltering commitment to the mission. For over four decades, our team has been providing some of the world's most technically advanced full-spectrum cyber, data operations, systems integration and intelligence support services to the U.S. government on its most important missions.
At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients.
Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team.
At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective expertise to drive innovation, solve complex problems, and deliver exceptional results for our clients.
Thank you for considering joining us as we embark on this new journey and shape the future of cybersecurity and intelligence together as part of the Nightwing team.
Nightwing is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age or any other federally protected class.
-
Cyber Command Forensic Analyst
1 week ago
, , United States Donnelly and Moore Full timeJob Description Justification: The resource function is essential to NYC3's ability to defend City systems from cyber threat including direct support of life safety, and revenue generating operations. Ransomware authors are routinely targeting critical infrastructure. The Analyst will contribute to NYC3's ability to respond to citywide cybersecurity...
-
Cyber Command Forensic Analyst
2 weeks ago
, , United States Donnelly and Moore Full timeJob Description Justification: The resource function is essential to NYC3's ability to defend City systems from cyber threat including direct support of life safety, and revenue generating operations. Ransomware authors are routinely targeting critical infrastructure. The Analyst will contribute to NYC3's ability to respond to citywide cybersecurity...
-
Cyber Command Forensic Analyst
7 days ago
, , United States Donnelly and Moore Full timeJob Description Justification: The resource function is essential to NYC3's ability to defend City systems from cyber threat including direct support of life safety, and revenue generating operations. Ransomware authors are routinely targeting critical infrastructure. The Analyst will contribute to NYC3's ability to respond to citywide cybersecurity...
-
Senior MDR Analyst
1 hour ago
United States Blackpoint Cyber Full timeBlackpoint Cyber is the leading provider of world-class cybersecurity threat hunting, detection and remediation technology. Founded by former National Security Agency (NSA) cyber operations experts who applied their learnings to bring national security-grade technology solutions to commercial customers around the world, Blackpoint Cyber is in hyper-growth...
-
Cyber Incident Response Engineer II
24 minutes ago
United States Lifetime Benefit Solutions Full timeJob Description:Summary:The Cyber Incident Response (IR) Engineer role is critical in detecting, investigating, and responding to cybersecurity threats across the enterprise. This role supports and leads security operations through proactive threat hunting, tool development, forensics, and containment. The engineer collaborates across a broad range of...
-
Cyber security analyst
2 weeks ago
, , United States Ova Technologies Full timeJob Title: Cybersecurity Analyst Location: Alpharetta,GA Job Type: Full-Time Department: Information Security / IT Reports To: Security Manager / IT Director Job Summary We are seeking a detail-oriented and proactive Cybersecurity Analyst to join our security team. The ideal candidate will be responsible for monitoring, detecting, and responding to security...
-
Cyber security analyst
2 weeks ago
, , United States Ova Technologies Full timeJob Title: Cybersecurity Analyst Location: Alpharetta,GA Job Type: Full-Time Department: Information Security / IT Reports To: Security Manager / IT Director Job Summary We are seeking a detail-oriented and proactive Cybersecurity Analyst to join our security team. The ideal candidate will be responsible for monitoring, detecting, and responding to security...
-
Senior Cyber Security Ops Analyst
2 hours ago
United States Spartan Technologies Full timeSenior Cyber Security Ops AnalystApplicants Need To Know6+ Month ContractWork Status: USC, GCSponsorship: No, Sponsorship provided.Office Type: RemoteLocation: Eastern OR Central time zonesHourly Rate: $75 to $85 W2 OnlyNo Corp-to-CorpPlease note that only candidates who are authorized to work in the United States without sponsorship will be considered for...
-
Security Incident Response Analyst
7 days ago
, , United States Jamie Grayem Full timeSenior Incident Response Analyst (REMOTE/ On Call) The Organization Industry Healthcare Compensation Range$90,000 - $160,000 / year + 8% annual bonus On-Call Support Required Sponsorship No A diversified, national organization committed to improving health outcomes for its 28 million members through the innovative use of technology. The company offers...
-
Security Incident Response Analyst
2 weeks ago
, , United States Jamie Grayem Full timeSenior Incident Response Analyst (REMOTE/ On Call) The Organization Industry Healthcare Compensation Range$90,000 - $160,000 / year + 8% annual bonus On-Call Support Required Sponsorship No A diversified, national organization committed to improving health outcomes for its 28 million members through the innovative use of technology. The company offers...