Search for More Jobs
Get alerts for jobs like this Get jobs like this tweeted to you
Company: SAIC
Location: Fort Liberty, NC
Career Level: Mid-Senior Level
Industries: Technology, Software, IT, Electronics

Description

Description

SAIC is seeking a highly motivated Cybersecurity Incident Manager to support the USSOCOM SITEC 3 Enterprise Operations and Maintenance (EOM) contract. Your career at SAIC enables USSOCOM to fulfill its mission to “Provide fully capable Special Operations Forces (SOF) to defend the United States and its interests and synchronize planning for global operations against terrorist networks.” As a member of our team, you will partner with SOF military and civilian members to provide world-class IT services and support that connects over 60,000 users around the world in the areas of software development/maintenance, network services, security, end-user computing, and test and evaluation. This position is based at Fort Bragg, North Carolina. 

The Cybersecurity Incident Manager performs essential functions to protect the network in accordance with the SOF Information Environment (SIE) Operations Order (OPORD).  Additionally, the Cybersecurity Incident Manager:

  • Investigates alerts, anomalies, errors, intrusions, malware, etc. to identify the extent of a security incident and be able to help isolate the responsible agents.

  • Recommends improvements to automated information system security policies.
  • Performs system, security, and operational testing/evaluation events.
  • Tests to ensure Government data is protected from unauthorized disclosure and remains under Government control.
  • Tests to verify configuration and protections of external and internal data flows between applications, containers, virtual devices, virtual machines, and cloud infrastructure.
  • Tests to verify data at rest encryption on cloud infrastructure.
  • Tests the build and related procedures.
  • Detects network intrusions and cyber incidents.
  • Detects, identifies, and alerts the Government of possible attacks/intrusions, anomalous activities, and misuse activities, distinguishing these incidents and events from benign activities.
  • Assists in incident response.
  • Monitors systems security and responses to security incidents.
  • Participates in security systems testing.
  • Ensures integrity and confidentiality of sensitive data.
  • Supports incident containment and remediation recommendations.
  • Conducts log file analysis.
  • Uses various tools such as Remedy, Splunk, and Office automation to perform duties.

Qualifications

  • Bachelor's degree and 5+ years of related experience, OR Master's degree and 3+ years of related experience, OR 9+ years of related experience in lieu of degree. 

  • Proficiency in Microsoft operating platforms and office applications.

  • Exceptional collaboration and communication skills.

  • Strong analytical and problem-solving skills
  • Ability to communicate security issues clearly to both technical and non-technical stakeholders
  • Ability to work in a fast-paced environment.

  • Ability to brief senior military and government leaders.

Certification Requirements:

  • DoDD 8570.01-M IAT Level II AND

  • CSSP Manager OR

  • CSSP Incident Responder OR
  • CSSP Analyst OR
  • CSSP Auditor

Clearance:

  • Must be a U.S. Citizen with an active Top Secret Clearance to start; must be able to obtain a TS/SCI. 


 Apply on company website