Current jobs related to Incident Response Analyst - Reston - Oracle
-
Incident Response Analyst
4 days ago
Reston, Virginia, United States Evolver Federal Full timeEstimated Salary: $90,000 - $110,000 per yearAbout the JobThis role involves serving as the Initial Escalation Point for all Investigations/Incidents Requiring Remediation and/or Coordination. The ideal candidate will have 5 years of related experience in security operations, a Bachelor's degree or 10 years of hands-on security work experience, US...
-
Incident Response Specialist
7 days ago
Reston, Virginia, United States Evolver Federal Full timeWe are looking for a talented Incident Response Specialist to join our team at Evolver Federal in Washington, DC. The ideal candidate will have a strong background in incident response and 5+ years of experience in security operations.Key ResponsibilitiesResponding to Security Incidents with Strict Adherence to Codified Triage Process and...
-
Incident Response Manager
4 weeks ago
Reston, Virginia, United States Eviden Full timeIncident Response ManagerEstimated Salary: $150,000 - $220,000 per yearWe are looking for an Incident Response Manager to join our team at Eviden. In this role, you will be responsible for identifying gaps in customer domain/business applications/technology deployed and proactively fixing committed vs delivered issues.Key Responsibilities:Monitor log sources...
-
Cybersecurity Expert
4 weeks ago
Reston, Virginia, United States SeKON Full timeCybersecurity Expert - Threat Intelligence and Incident ResponseSeKON is seeking an experienced Cybersecurity Expert to join our Information Security team. In this role, you will lead the planning, implementation, and monitoring of security measures to protect the organization's computer networks and sensitive information.Responsibilities:Security Strategy...
-
Reston, Virginia, United States GuidePoint Security Full timeAbout GuidePoint SecurityGuidePoint Security is a rapidly growing value-added reseller that focuses exclusively on Information Security, serving over 4,200 customers and employing over 1,000 employees. Our company's core values drive all aspects of our business, making us a trusted advisor in the industry.Job SummaryWe are seeking a highly skilled...
-
Security Operations Center Analyst
2 months ago
Reston, United States Eviden Full timeSecurity Analyst - MDR (SOC)Experience Range: 2-3 years of relevant experience in cyber security.Required Qualifications:Strong analytical and technical skills in computer network defense operationsIncident response Handling (Detection, Analysis, Triage, Recommendations)Performing advance investigation of security incidents (reported by L1 & L2 Analyst)...
-
Security Operations Center Analyst
1 month ago
Reston, United States Eviden Full timeSecurity Analyst - MDR (SOC)Experience Range: 2-3 years of relevant experience in cyber security.Required Qualifications:Strong analytical and technical skills in computer network defense operationsIncident response Handling (Detection, Analysis, Triage, Recommendations)Performing advance investigation of security incidents (reported by L1 & L2 Analyst)...
-
Government System Security Analyst
1 week ago
Reston, Virginia, United States Cornerstone Defense Full timeCybersecurity Compliance ExpertAbout the Job:Come work with us at Cornerstone Defense as a Cybersecurity Compliance Expert. As a Cybersecurity Analyst with a focus on Government System ATO support, you will be responsible for developing and implementing incident response plans, including containment, eradication, and recovery strategies for government...
-
Cyber Threat Analyst 3
4 weeks ago
Reston, Virginia, United States ECS Full timeAbout the RoleECS is seeking a highly skilled Cyber Threat Analyst 3 to join our team in Fairfax, VA. As a Cyber Threat Analyst, you will be responsible for investigating threats targeting ECS' internal network and commercial customers.Key ResponsibilitiesLead incident response efforts, including forensic triage and detailed technical reporting.Mentor and...
-
Data Analyst
2 days ago
Reston, United States Unisys Full timePOSITION: Data Analyst IIIDURATION: 12+ MonthsLOCATION: RemoteData Encryption Analyst roleThe Data Encryption Analyst is responsible for collecting the required information and provide guidance to the application teams on use of secure encryption algorithms and ciphers for data-in-transit as well as data at-rest to protect sensitive information. The person...
-
Data Analyst
2 weeks ago
Reston, United States Unisys Full timePOSITION: Data Analyst IIIDURATION: 12+ MonthsLOCATION: RemoteData Encryption Analyst roleThe Data Encryption Analyst is responsible for collecting the required information and provide guidance to the application teams on use of secure encryption algorithms and ciphers for data-in-transit as well as data at-rest to protect sensitive information. The person...
-
Cybersecurity Analyst
1 week ago
Reston, Virginia, United States Evolver Federal Full timeEvolver Federal is seeking a highly skilled Cybersecurity Analyst - Threat Hunter to join our team in Washington, DC. The ideal candidate will have a strong background in threat hunting and 5+ years of experience in security operations.Key ResponsibilitiesPerforming Identification of Effected Systems, Networks and DataEngaging with Network Operations to...
-
Cyber Security Operations Center Analyst
2 weeks ago
Reston, Virginia, United States Peraton Full timeJob OverviewWe are seeking a skilled Cyber Security Operations Center Analyst to join our team. This role is responsible for monitoring and analyzing security events, identifying potential threats, and responding to incidents in a timely manner.
-
Information Security Analyst
4 weeks ago
Reston, Virginia, United States Evolver Federal Full timeWe are seeking a highly skilled Information Security Analyst to join our team at Evolver Federal in Washington, DC. The successful candidate will have a strong background in security operations and experience working with Splunk SIEM application.Job DescriptionThe primary responsibilities of this role include:Investigating security incidents and performing...
-
SOC - Security Operations Analyst
1 month ago
Reston, United States Evolver Full timeEvolver Federal is looking for a SOC - Security Operations Analyst, to join our team on a large Security Operations program with our Federal client located in Washington, DC. Responsibilities Serving as the Initial Escalation Point for all Investigations/Incidents Requiring Remediation and/or Coordination Continuous Monitoring of the Alert Queue Responding...
-
Service Desk Analyst
2 weeks ago
Reston, United States GDH Full timeJob DescriptionOur client is hiring a dedicated and knowledgeable Service Desk Analyst to join our team in Dallas. This entry-level position is designed for individuals who are eager to begin their career in IT support, providing first-level assistance for service requests and incident resolution. The role operates within a 24 x 7 x 365 environment,...
-
Service Desk Analyst
2 weeks ago
Reston, United States GDH Full timeJob DescriptionOur client is hiring a dedicated and knowledgeable Service Desk Analyst to join our team in Dallas. This entry-level position is designed for individuals who are eager to begin their career in IT support, providing first-level assistance for service requests and incident resolution. The role operates within a 24 x 7 x 365 environment,...
-
Malware Detection and Response Expert
4 weeks ago
Reston, Virginia, United States Eviden Full timeEviden is looking for a highly skilled Malware Detection and Response Expert to join our team. In this role, you will be responsible for monitoring for threats, analyzing data, and notifying customers of potential security risks.Responsibilities:Monitor for threats, analyze, and notify customerSecurity Log analysis to detect attack origin, attack spread,...
-
Cloud Cyber Defense Analyst: Secure the Future
4 weeks ago
Reston, Virginia, United States The One 23 Group Full timeAt The One 23 Group, we are dedicated to setting the benchmark for excellence in government services. Our mission is to empower our clients in the Department of Defense, Intelligence Community, and Federal Civilian sectors to excel with our advanced capabilities. We foster a people-first culture, underpinned by steadfast ethical principles.We leverage...
-
Network Defense Analyst
2 weeks ago
Reston, Virginia, United States Iridium Satellite Full timeSecurity Threat Investigator Job DescriptionIridium Satellite is looking for a talented IT Security Threat Investigator to join our team. The successful candidate will have a strong background in IT security and be able to work independently to investigate security threats and vulnerabilities.The estimated salary for this position is $160,000 - $220,000 per...
Incident Response Analyst
7 months ago
*US Citizenship with preference for TS/SCI and FSP
Are you interested in securing a large-scale distributed SaaS environment? Oracle's SaaS Cloud Security team is building new technologies that operate at high scale in our broadly distributed multi-tenant cloud environment. The Detections and Response Team plays a key role in enabling Oracle's Security vision, minimizing security incident-based losses and disruptions, facilitating efficient recovery from such incidents, and ensuring the implementation of controls to mitigate associated risk.
SaaS Cloud Security is looking for seasoned security analysts that possess and maintain a US Government Top Secret SCI w/ Polygraph Security Clearance to join our efforts in reshaping the cloud services landscape across industry verticals and solve difficult problems by designing and building innovative new systems to revolutionize the security of Oracle's SaaS portfolio of products.
The SaaS Cloud Security organization is responsible for securing enterprise-grade software services on behalf of our 25,000 customers, processing over 60 billion transactions per day.
We are building a global team of analysts that can work autonomously to carry out activities in the areas of detection and response to protect the Oracle SaaS environment. The team will be able to, collectively cover, the breadth and depth of: monitoring for Indicators of Compromise, being up to date with the latest third-party Threat Intelligence, responding to identified incidents including attack remediation, evidence collection and forensics. The team will also support the continual improvement of processes and technology used for maximizing automation of detection and response for SaaS.
Career Level -
Key Responsibilities
• Perform hands-on activities including network and log analysis, malware analysis and threat hunting.
• Assist with the development of processes and procedures to improve security operations functions, incident response times, analysis of incidents, and overall SOC functions.
• Develop scripts, processes and content to improve response capabilities.
• Research industry trends, identify ongoing security threats, analyze new security testing tools, and provide recommendations on the need and usefulness of services and/or products.
• Evaluate and recommend new and emerging security solutions and technologies to issues.
• Effectively communicate security concepts with both technical and non-technical individuals.
• Provide information regarding intrusion events, security incidents, and other threat indications and warning information to teams and leadership as part of incident response.
• Deliver self-service security metric data of discovery, triage and trending analysis of team findings.
• Author post mortem reports to be provided to senior leadership following an intrusion or red team engagement.
• Participate in planning, designing, and executing tabletop exercises cross-functionally across Oracle for SaaS security incident planning.
• Help define Threat Hunting use cases.
• Participate in Red/Blue team activities.
Required Qualifications
• Bachelor’s Degree in Computer Science, Information Assurance, Security, Management Information Systems, Risk Management, or equivalent work experience acceptable.
• 4+ years of related cybersecurity architecture, engineering, SOC work experience (monitoring, incident response, forensics).
• Strong understanding of typical intrusion life cycle, including privilege escalation, persistence, and lateral movement techniques.
• Strong understanding of host and network Incident Response processes, tasks, tools, and industry operational best practices.
• Understanding of MITRE ATT&CKTM knowledge base.
• Strong and hands-on forensics experience/knowledge on Linux and Windows Operating Systems.
• Python scripting experience preferred
• Experience with problem solving and troubleshooting complex issues with an emphasis on root cause analysis.
• Understanding Application security architectures . OWASP top 10 web application security risks, database security, authentication schemes.
• Excellent customer service skills required.
• Ability to both work independently with minimal direction and to collaborate effectively with local and remote teams with a strong customer focus.
• Excellent written and verbal communications, including presentation skills, are important to be successful in this role.
• Proven ability to effectively communicate with all levels of the organization, as well as with external parties.
Preferred Qualifications
• 2+ years of experience as a Incident Response or DFIR Analyst.
• 2+ years of Python scripting experience preferred
Degree in computer science or related field.
4-8+ years of experience within the security department of a large cloud or Internet software company.
• Ideal candidate should possess at least two of the following certifications:
SANS GIAC Cyber Threat Intelligence (GCTI) SANS GIAC Network Forensic Analyst (GNFA) SANS GIAC Certified Forensic Analyst (GCFA) SANS GIAC Certified Forensic Examiner (GCFE) SANS GIAC Certified Incident Handler (GCIH) SANS GIAC Certified Intrusion Analyst (GCIA) SANS GIAC Reverse Engineering Malware (GREM) Certified Information Systems Security Professional (CISSP) Offensive Security Certified Professional (OSCP) Disclaimer:Certain US customer or client-facing roles may be required to comply with applicable requirements, such as immunization and occupational health mandates.
Range and benefit information provided in this posting are specific to the stated locations only
US: Hiring Range: from $109,100 to $223,500 per annum. May be eligible for bonus and equity.
Oracle maintains broad salary ranges for its roles in order to account for variations in knowledge, skills, experience, market conditions and locations, as well as reflect Oracle’s differing products, industries and lines of business.
Candidates are typically placed into the range based on the preceding factors as well as internal peer equity.
Oracle US offers a comprehensive benefits package which includes the following:
1. Medical, dental, and vision insurance, including expert medical opinion
2. Short term disability and long term disability
3. Life insurance and AD&D
4. Supplemental life insurance (Employee/Spouse/Child)
5. Health care and dependent care Flexible Spending Accounts
6. Pre-tax commuter and parking benefits
7. 401(k) Savings and Investment Plan with company match
8. Paid time off: Flexible Vacation is provided to all eligible employees assigned to a salaried (non-overtime eligible) position. Accrued Vacation is provided to all other employees eligible for vacation benefits. For employees working at least 35 hours per week, the vacation accrual rate is 13 days annually for the first three years of employment and 18 days annually for subsequent years of employment. Vacation accrual is prorated for employees working between 20 and 34 hours per week. Employees working fewer than 20 hours per week are not eligible for vacation.
9. 11 paid holidays
10. Paid sick leave: 72 hours of paid sick leave upon date of hire. Refreshes each calendar year. Unused balance will carry over each year up to a maximum cap of 112 hours.
11. Paid parental leave
12. Adoption assistance
13. Employee Stock Purchase Plan
14. Financial planning and group legal
15. Voluntary benefits including auto, homeowner and pet insurance