Full-Time

Incident Handler Tier I

Posted on 11/15/2024

Arsiem Corporation

Arsiem Corporation

11-50 employees

IT consulting and cybersecurity for governments

Consulting
Cybersecurity

Compensation Overview

$82k - $91kAnnually

Entry

No H1B Sponsorship

Monterey, CA, USA

Position requires onsite presence in Monterey, CA.

US Top Secret Clearance, US Citizenship Required

Category
Cybersecurity
IT & Security
Required Skills
Splunk
Linux/Unix
Requirements
  • Minimum of one (1) year of professional experience in ANY of the following: network or UNIX/Linux system administration, software engineering, software development, AND/OR a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, OR related field.
  • Certification: Sec+
  • Must obtain one of the following certificates within 6 months of hire date: CompTIA CySA+, EC-Council CEH, GIAC GCIA, Microsoft AZ 900, Palo Alto Networks PCCET, Splunk Core Certified Advanced Power User
  • This position requires an active Secret clearance. You must be a US Citizen for consideration.
Responsibilities
  • Use the SIEM tool to receive security alerts, perform initial investigations, and provide damage assessments based on findings
  • Review the latest alerts/events from various sensors to determine relevancy and urgency.
  • Enrich incidents with open source and/or other sources of information to handle incidents accurately.
  • Appropriately document all alerts/incidents in the approved ticketing system.
  • Analyze and elevate as appropriate for IHT2 review.
  • Preserve evidence integrity according to CSOC standard operating procedures or national standards.
  • Monitor network activity using cybersecurity tools to protect against malware. (Endpoint protection, restrict/prevent external devices, spam filters, Network access controllers, ACLs)
  • Recognize and categorize types of vulnerabilities and associated attacks (threat hunting and sharing)
  • Use CSOC security tools to Identify, capture, contain, and report on malware-related activity
  • Provide feedback to improve techniques and procedures used for detecting host and network-based intrusions
  • Use CSOC SOPs/procedures and suggest recommendations to fine-tune these processes to Tier 2 analyst
  • Handle incident handling tasks from Tier 2 analysts, CSOC manager and leadership
  • Handle other tasks that a Tier 1 level of experience and talent can complete.
  • Under supervision, may manage and configure security monitoring tools (SIEM, IDS, Firewall, Access Control Lists, etc.) to mitigate existing threats/vulnerabilities.

ARSIEM Corporation provides advanced IT consulting services, specializing in multiple areas including cybersecurity, enterprise architecture and development, and applications development, predominantly for government clients. The firm is distinguished by its deep commitment to cybersecurity and robust IT solutions that ensure enhanced protection and efficient digital infrastructures. This commitment to leveraging cutting-edge technologies in specialized areas of IT makes ARSIEM Corporation an excellent workplace for professionals aiming to actively contribute to significant, high-impact projects within the government sector.

Company Stage

N/A

Total Funding

N/A

Headquarters

Baltimore, Maryland

Founded

2013

Growth & Insights
Headcount

6 month growth

22%

1 year growth

2%

2 year growth

22%