Incident Response Jobs

26 to 50 of 389 Incident Response Jobs

Boundary Protection Engineer - TS/SCI with Poly Required

Manassas, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Burke, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Chantilly, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Sterling, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Aldie, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Merrifield, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Reston, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Herndon, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Boundary Protection Engineer - TS/SCI with Poly Required

Falls Church, Virginia, United States
Leidos
Security Appliance (ASA), and Forcepoint firewall equipment and applications Generate, determine impact of, and implement custom proxy policies and/or policy exceptions in response to ongoing technology implementation activities on the program Proxy Subject Matter Expert (SME) for integration of other technologies within the program (function as an … evidence collection, protection, and analysis techniques for customer owned and maintained hardware and/or software Provide real-time monitoring and alerting of security incident investigations on perimeter/internal infrastructure Provide day-to-day Operations and Maintenance (O&M) support for all incident management events and outages … years. Additional required qualifications include: Candidate must have 7 years of relevant boundary protection experience delivering fault tolerant data network infrastructure solutions and incident response Must comply with DoD 8570 Information Assurance Technical (IAT) Level 2. Experience in configuring and troubleshooting boundary protection technologies such as Palo Alto more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Information Systems Security Engineer (ISSE)

Annapolis Junction, Maryland, United States
Leidos
Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Cyber Policy Analyst

Springfield, Virginia, United States
Leidos
further promote the Department's national security posture. Support the creation of government SOPs and playbooks for security guidance that support NSS policy (e.g. incident response, scorecards, stakeholder training) Perform DHS National Security Exception (NSE) reviews and analyses in support of DHS Section 508 compliance, as required. Document more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Engineer

Annapolis Junction, Maryland, United States
Leidos
Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer (ISSE)

Annapolis Junction, Maryland, United States
Leidos
Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls that encompass the development, design more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Sr Manager, Security Incident Response Team

Philadelphia, Pennsylvania, United States
Comcast Corporation
Develops financial and operational objectives. Ensures that enterprise-wide operational plans are aligned with business objectives. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … of impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the Security Incident Response Team Serve as incident commander, leading incident response for major incidents. Clearly communicate incident status to critical stakeholders more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Sr Manager, Security Incident Response Team

Mount Laurel, New Jersey, United States
Comcast Corporation
Develops financial and operational objectives. Ensures that enterprise-wide operational plans are aligned with business objectives. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … of impact on business results, and typically manages one or more groups of professional employees. Job Description Responsibilities Lead daily operations of the Security Incident Response Team Serve as incident commander, leading incident response for major incidents. Clearly communicate incident status to critical stakeholders more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Principal Engineer, Security Incident Response Team

Mount Laurel, New Jersey, United States
Comcast Corporation
innovative solutions for complex cyber engineering developmental problems that are competitive with industry and company standards. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … and guidance to more junior team members. May be responsible for leading a team, but does not directly manage people. Job Description Responsibilities Lead response to Cyber Security Incidents of varying complexity levels - including all steps from identification to final closeout Identify activity of investigative interest based on a more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Sr Manager, Detection & Orchestration

Philadelphia, Pennsylvania, United States
Comcast Corporation
Develops financial and operational objectives. Ensures that enterprise-wide operational plans are aligned with business objectives. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … and stay current & suggest enhancements in program capabilities. Track status and completion of all team projects. Lead team huddles and cross department meetings with response orgs and other key stakeholders. Handle escalations from team members as required. Required Experience: 10+ years experience in Cyber Security, of which at least more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Principal Engineer, Security Incident Response Team

Philadelphia, Pennsylvania, United States
Comcast Corporation
innovative solutions for complex cyber engineering developmental problems that are competitive with industry and company standards. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … and guidance to more junior team members. May be responsible for leading a team, but does not directly manage people. Job Description Responsibilities Lead response to Cyber Security Incidents of varying complexity levels - including all steps from identification to final closeout Identify activity of investigative interest based on a more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Comcast Cybersecurity: Sr Manager, Detection & Orchestration

Mount Laurel, New Jersey, United States
Comcast Corporation
Develops financial and operational objectives. Ensures that enterprise-wide operational plans are aligned with business objectives. Responsible for monitoring, identifying, investigating and analyzing all response activities related to cybersecurity incidents within an organization. Identifies security flaws and vulnerabilities; responds to cybersecurity incidents, conducts threat analysis as directed and addresses … software vulnerability assessments and penetration testing utilizing reverse engineering techniques. Perform vulnerability analysis and exploitation of applications, operating systems or networks. Identifies intrusion or incident path and method. Isolates, blocks or removes threat access. Evaluates system security configurations. Evaluates findings and performs root cause analysis. Performs analysis of complex … and stay current & suggest enhancements in program capabilities. Track status and completion of all team projects. Lead team huddles and cross department meetings with response orgs and other key stakeholders. Handle escalations from team members as required. Required Experience: 10+ years experience in Cyber Security, of which at least more »
Employment Type: Permanent
Salary: USD Annual
Posted:

Enterprise Security Incident Manager

United Kingdom
Experian Ltd
As a member of Experians Global Security Office, the Enterprise Security Incident Manager functions as a Cyber Incident Commander and coordinates the Cyber Fusion Centres (CFCs) response to significant cyber-security incidents according to Experians Global Information Security Incident Response Plan and processes. You will … be responsible for initiating and tracking various workstreams during security incidents to ensure there is effective detection, response, containment, eradication, and recovery during incident response and managing executive communications until incident termination. The candidate for this role must be a self-starter, capable of working independently … and have strong technical skills involving cyber-incident response, strong writing skills and effective communication with leaders. This role will require you to be part of an on-call rotation for response to significant security incidents outside of normal work hours, including holidays and weekends. Key Responsibilities more »
Employment Type: Permanent
Posted:

Splunk Engineer

United Kingdom
Hybrid / WFH Options
La Fosse Associates Ltd
and production environments. Assist the project, SOC and wider teams and help develop Cyber Use Cases e.g. log source onboarding, use case development with incident response playbook development and automation and integration with Service Now and SysNG Ensure cyber use cases are successfully tested, with defects remediated through more »
Employment Type: Contract, Work From Home
Rate: £550 - £600 per day
Posted:

Automation Engineer-Azure

Leeds, West Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
McGregor Boyall Associates Limited
Azure Storage, Security, and Network Components. Azure policies and governance tools for handling compliance and security Expertise in securing virtualized environments, including threat detection, incident response, and compliance frameworks. Automation tooling for example, Logic Apps, Functions, Azure Automation, Event Grid etc AVD architecture, deployment options, management tools, and more »
Employment Type: Permanent, Work From Home
Salary: £90,000
Posted:

AI Securtity Architect

Reading, Berkshire, South East, United Kingdom
Maclean Moore Ltd
potential risks. Conduct regular training sessions and awareness programs to educate stakeholders on AI/ML security best practices, policies, and procedures. Work alongside incident response teams to investigate and respond to security incidents and breaches involving AI/ML systems, implementing remedial actions and preventative measures. Evaluate more »
Employment Type: Contract
Rate: £600
Posted:

2nd Line IT Support Technician

Lichfield, Staffordshire, West Midlands, United Kingdom
RECRUIT123 LIMITED
encourages their employees to gain recognition with industry certifications and to build their experience with exposure to new technologies, service delivery and post-breach incident response. A competitive salary and a great working environment is on offer here. What we need from you as a 2 nd Line IT … support issues and some 3 rd line support issues raised through the helpdesk Visits as required to customer sites to provide Technical Support or Incident Response Providing Systems, Network & Firewall Support Providing a pro-active response toNOCandSOCdetections in customer systems Visits as required to customer sites to … provide Technical Support or Incident Response Salary/package: £28,000 -£35,000 per annum. Monday to Friday9.00amto 5.00pm. Benefits: (Easy Access) Located near to the national road network. 3 miles to JunctionT4of theM6toll road and theA5,mile to theA38 Friendly open-door culture where employees are encouraged more »
Employment Type: Permanent
Salary: £35,000
Posted:

Security Operations Manager

London, United Kingdom
BDO
policies and audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incident response, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM more »
Posted:
Incident Response
10th Percentile
£42,500
25th Percentile
£51,250
Median
£65,000
75th Percentile
£81,250
90th Percentile
£97,500