Incident Response Lead

Ashburn, VA
Federal / Civilian – Cyber / Security /
Regular /
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 297

Job Title: Incident Response Deputy Team Lead

Location: 22001 Loudoun County Pkwy Ashburn, Virginia 20147

Clearance Level: Active DoD - Secret

Required Certification(s): 
·       The candidate should have at minimum ONE of the following certifications: · CompTIA Cyber Security Analyst (CySA+) · CompTIA Linux Network Professional (CLNP) · CompTIA Pentest+

The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection and protective security services to DHS's information systems.  The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.
As a leader of this highly visible cyber Security Operations Center (SOC), you will be responsible for:  managing day to day operations of the team, coordinating efforts of the team, leading by example and performing in-depth technical analysis of network and endpoint logs & activity, cyber incident analysis, escalating findings as deemed appropriate, and containment, remediation and root cause analysis in support of the protection of the customers’ systems, networks, and assets.

·       Responsible for managing the team of Cyber Threat Hunt Analysts, threat hunts, the scheduling of hunts, and proposing new enclaves, systems, and assets to conduct hunts on.
·       Partner with other task leads in support of customer initiatives and cyber incidents.
·       Create dashboards for key metrics and processes and deliver technical presentations to various levels of customer leadership.
·       Utilize state of the art technologies such as host forensics tools(FTK/Encase), Endpoint Detection & Response tools, log analysis (Splunk) and network forensics (full packet capture solution) to perform hunt and investigative activity to examine endpoint and network-based data.
·       Conduct in-depth analysis on hosts and networks, forensic analysis, log analysis, and triage in support of incident response. · Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis, and incident response processes. Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes. ·
·       Lead incident response activities and mentor junior SOC staff. · Work with key stakeholders to implement remediation plans in response to incidents.
·       Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership. ·
·       Flexible and adaptable self-starter with strong relationship-building skills · Ability to stay up to date with the latest threat intelligence, security trends, tools and capabilities. ·
·       Possess strong problem-solving abilities with an analytic and qualitative eye for reasoning. ·
·       Ability to independently prioritize and complete multiple tasks with little to no supervision. ·
·       Effectively communicate with customer leadership and disseminate timely updates of critical incidents with emphasis on attention to detail and accurate reporting.


Required Certifications
·       The candidate should have at minimum ONE of the following certifications: · CompTIA Cyber Security Analyst (CySA+) · CompTIA Linux Network Professional (CLNP) · CompTIA Pentest+

Education, Background, and Years of Experience
·       Bachelor’s degree in a science or engineering field, IT, or Cybersecurity related field. 8- 12years of experience be in the areas of incident detection and response, remediation, malware analysis, or computer forensics. · Ability to prioritize and complete multiple tasks with little to no supervision


Required Skills
·       Experience organizing, directing, and managing contract operation support functions involving multiple, complex, and interrelated project tasks. Experience effectively communicating at senior levels within a customer organization.
·       Advanced knowledge of the Incident Response Lifecycle and applicability to various types of incidents and situations.
·       Ability to collaborate with technical staff and customers to identify, assess, and resolve complex security problems/issues/risks and facilitate resolution and risk mitigation.
·       Effective communication skills with emphasis on attention to detail, ability to accurately capture and document technical remediation details, and ability to brief stakeholders on incident statuses. ·
·       Experience creating new processes, playbooks, and SOPs for new tools and workflows. Prior relevant experience should be in the areas of incident detection and response, malware analysis, or computer forensics.
·       Ability to script in one more of the following computer languages Python, Bash, Visual Basic or PowerShell.
·       Experience running cyber incident investigations with emphasis on attention to detail, adept communication skills, and adherence to defined escalation paths.


Environmental Conditions
·       Onsite once a week in Ashburn, VA.
·       Monday - Friday, regular business hours.

Strength Demands
·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.

Physical Requirements
·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)