What are the responsibilities and job description for the Tier I Analyst position at TechnaLink?
Technalink is seeking a Incident Response Lead to join our team to assist our federal client in Washington, DC.
As a Specialist Senior within our Cyber Risk team, you will:
• Work with Federal clients to mitigate cyber risk and threats
• Identify opportunities for efficiencies in work process and innovative approaches to completing scope of work
• Participate in team problem solving efforts and offer ideas to solve client issues
• Conduct relevant research, data analysis, and create reports
• Maintain responsibility for completion and accuracy of work products
• Assist in proposal development, as requested
• Actively expand consulting skills and professional development through training courses, mentoring, and daily interaction with clients
• Serve as a "Subject Matter Expert”, adding interpretive value to data presented or experienced insight into a functional process or issue
• Improve the operational systems, processes, and policies in support of the client's mission through the management and guidance of multiple work streams, teams, and clients
• Support engagements related but not limited to Operations & Maintenance, Helpdesk Operations, Software and Application Development and Maintenance, Financial Operations, and Project and Acquisition Management
• Provide input to key deliverable structure and content, as well as facilitating buy-in of proposed solutions from top management levels
• Direct timely delivery of quality work products for the client
• Manage engagement risk
• Provide professional development of junior staff performing the role of counselor and coach, as well as providing leadership and support
Qualifications
• Bachelor's Degree in Information Technology, Information Systems Security, Cybersecurity, or related field
• 6 years of relevant consulting or industry experience
• Proven experience effectively prioritizing workload to meet deadlines and work objectives
• Demonstrated ability to write clearly, succinctly, and in a manner that appeals to a wide audience
• Proficiency in word processing, spreadsheet, and presentation creation tools, as well as Internet research tools
• Ability to obtain and maintain the required clearance for this role
• Must be legally authorized to work in the United Stated without the need for employer sponsorship, now or at any time in the future
• Support the IR contracted lead plans and prepare federal agency computer systems for incident response, crisis response, intrusion response, including enhancing and operating the agency's 24/7/365 Security Operations Center, and ensuring the efficient performance of the IR team.
• Creating a program development plan that includes security gap assessments, policies, procedures, playbooks, training and tabletop testing.
• Producing detailed incident reports and technical briefs for management, administrators and end-users.
• Experience with McAfee ePolicy Orchestrator Certification, Splunk Enterprise Certified Architect/Admin, RSA NetWitness Logs & Network Certified Administrator, GIAC Certified Incident Handler (GCIH) or EC-Council's Certified Incident Handler (E|CIH).
• Provide guidance and oversight of multiple individual SOC Analysts
• Prior MetaFlows and Fireye AX administrator experience
• Experience engaging customer technical POCs as necessary throughout SOC operations
• CISSP
Preferred:
• Previous Federal Consulting experience
• Understanding of fundamental cloud computing concepts
• Experience with Information Assurance concepts and processes within the Federal government
• Knowledge of and experience with Federal security regulations, standards, and processes including FISMA, FIPS, NIST, and FedRAMP