Job Summary

Incident Response Analyst needed ASAP!

  • Location:
    Washington, District of Columbia
  • Job reference:
  • Category:
  • Contract Type:
    Contract/Temp to Hire

Modis is currently looking for a Incident Response Team Analyst for our client in Washington, DC on a contract-to-hire basis! The secondary duties of this position are to serve as an Assistant Team Lead on the Security Operations team. Prior government experience required.
• Support/assist the client with real-time monitoring and triage of incident received at the operations center.
• Work collectively with other team members on incident analysis and response, and coordinate with external teams on resolution of incidents.
• Support efforts on threat hunting, network, host, and malware analysis, sensor tuning and custom signature creation
• Lead the application of cyber intelligence to improve security operations
• Oversee and perform investigation of network and hosts/endpoints for malicious activity, to include analysis of packet captures
• Oversee and assist in efforts to detect, confirm, contain, remediate, and recover from attacks
• Prepare executive summaries and conduct briefings on significant investigations
• Measure and manage individual and team performance
• Ensure adequate metrics and documentation of team operations for leadership and other constituents
• BS/BA degree from accredited university
• Three or more years of cyber security work experience
• Prior leadership experience with direct reports in a cyber environment
• Experience and effective participation in hunt, computer network defense, real-time analysis and incident response activities, to include ability to reconstruct events from network, endpoint, and log data
• Experience and understanding of host-based/endpoint protection systems
• Cyber intelligence, disk forensics and memory forensics experience
• Server administration experience
• Enterprise forensic tool(s) experience
• Federal contract experience
Training Requirements
• One or more certifications in information security (such as GCIA, GCIH, CEH, CISSP, SSCP, Sec+, etc)
Specialized Knowledge/Skills Requirements
• High technical ability/aptitude, demonstrated through prior technical experience and accomplishment
• Network investigation experience, to include netflow and packet/protocol capture and analysis
• Endpoint/host forensics experience
• SIEM experience
• Strong critical thinking, problem solving, and organization skills
• Strong teamwork and collaboration skills
• Good written and verbal communication skills
• Ability to pass a security clearance background investigation
• Sound cyber security knowledge foundation, to include understanding of
o Adversary TTPs
o Network technology and common protocols
o Network security
o Host security
o Malware
o Security tools and sensors
Must have: Splunk, Fire Eye, strong analysis intrusion experience

Apply Below


Note: Required fields marked with an asterisk (*).


Primary Number
[Ctrl (Cmd Mac) + Click] to select multiple industries
Upload your resume
Terms of Use


Upload your resume using

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.

Equal employment opportunity information:
EEO is the Law (poster) | EEO is the Law (poster supplement) | Reaffirmation of Affirmative Action Policy Statement