Mitigaton and Response-Technical Education, Training & Library - Chandler, AZ at Geebo

Mitigaton and Response-Technical

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Mitigation and Response, including Cyber Defense Incident Responder, Cyber Incident Response Analyst, and Cyber Intrusion Detection Specialist.
All positions are in the DHS Cybersecurity Service.
There are a variety of Mitigation and Response opportunities across the Department, including supporting several specialized programs at DHS Office of Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA), DHS Office of the Chief Information Officer (OCIO), and the Federal Emergency Management Agency (FEMA).
Depending on your career level and role, DHS Cybersecurity Service employees in the Technical Career Track, with a technical capability in Mitigation and Response, will generally apply their expertise to perform a range of tasks, including:
Supporting a team or program in monitoring, analysis, incident response, and handling for DHS or its constituents.
Proactively analyzing network traffic patterns to identify possible threats - includes analyzing log files from a variety of sources (e.
g.
, individual host logs, network traffic logs, firewall logs, and intrusion detection system IDS logs) and using other analytic tools and data science methodologies.
Actively monitoring DHS environments for potential threats or vulnerabilities, providing DHS or external agency/private industry leadership with situational visibility across the enterprise.
Creating threat assessments for vulnerabilities on networks, systems software, and hardware and recommending appropriate mitigation.
Ensuring incidents are managed in accordance with NIST stages of incident handling guidelines and assisting others who are less seasoned in properly applying these standards.
Customizing communications for different levels of leadership and audiences to provide strategic direction and support to DHS, Component leadership and/or their SOCs, or external constituents to enable mission capabilities.
Collaborating with internal and external DHS stakeholders in performing critical security operations and incident handling.
Working with HQ and/or Component NOC/SOCs to block or deny access by hostile sites or restrict access by specific ports/protocols.
Actively engaging processes to implement, configure, monitor, and maintain Security Information and Event Management (SIEM) tools to monitor, detect and respond to threats on DHS or federal/national partner networks and enclaves.
Applying techniques for gathering, recovering, analyzing, interpreting, preserving, and presenting information and digital evidence (from computers, mobile devices, websites, network packets, et al.
) to support legal prosecution or other departmental requirements.
Integrating stakeholder feedback when recommending recovery action plans for repairs, including mitigation strategies for interim system vulnerabilities/deficiencies.
Customizing communications (e.
g.
, incident updates and after-action reports) to emphasize the most critical information and address anticipated follow-up concerns of specific target audiences.
Proposing and maintaining, a suite of cybersecurity tools, to include SIEM and Endpoint Security Tools.
Working with designated managers, cyber incident responders, and cybersecurity service provider team members in handling suspected cyber incidents articulating the event's history, status, and potential impact for further action in accordance with the organization's cyber incident response plan.
Collaborating with team members to collect intrusion artifacts (e.
g.
, source code, malware, trojans) and using discovered data to enable mitigation of potential cyber defense incidents within the enterprise in accordance with recovery action plans.
This position is in the Technical Track across a range of career levels.
Employees in this career track generally:
Have between 5-15 years of cybersecurity work experience.
Range from experienced cybersecurity professionals who apply technical expertise and independent judgement to perform cybersecurity work - to - recognized Federal cybersecurity technical authorities with uncommon technical expertise who advise on cybersecurity challenges impacting DHS and the Nation.
DHS Cybersecurity Service employees with a technical capability in Mitigation and Responsewill generally:
Track and respond to prioritized urgent IT and cyber events and indicators of compromise (IOCs) to mitigate threats to networks, systems, and applications.
Investigate and analyze response activities and employs various advanced response and recovery approaches as appropriate.
Apply understanding of tactics, techniques, and procedures for investigative processes, including identifying adversaries' TTPs and applying corresponding defense or security controls.
Conduct root cause analysis and response coordination, providing recommendations for mitigation.
Execute recovery action plans and adapts plans to handle new developments.
DHS Cybersecurity Service employees start at career levels and salaries matching their experience and expertise.
To learn more about DHS Cybersecurity Service career tracks and levels, visit ourapplication portal.
This position is focused on Mitigation and Response.
DHS Cybersecurity Service jobs are structured cybersecurity specializations - called technical capabilities.
To learn more about technical capabilities, visit ourapplication portal.
Recommended Skills Assessments Communication Computer Networks Data Science Firewalls (Computer Science) Intrusion Detection Systems Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3r48z6vhdpv4nwm5v8', 'ExternalApply-j3r48z6vhdpv4nwm5v8'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.