Incident Manager II
Domain
Must-Have Requirements
- ✓BS Intelligence, Cybersecurity or related degree, or High School Diploma and 4 years of directly relevant experience
- ✓2+ years of directly relevant experience
- ✓Good understanding of intelligence analytical methods and sources
- ✓Demonstrated ability to integrate cyber security related data from relevant sources
- ✓Ability to work within a multi-disciplined team
- ✓Experience using multiple Intelligence Community database search tools
- ✓Familiarity with intelligence monitoring, collection, targeting and reporting
- ✓Working familiarity with Intelligence Community management of information, classification, dissemination and records systems
- ✓Working familiarity with Open-Source Intelligence sources including scraping tools and darkweb browsers
- ✓Sufficient technical knowledge to perform analysis on intelligence information
Nice to Have
- -Experience supporting Intelligence and/or DoD Customers
- -Experience performing network security or application security
- -Excellent verbal and writing skills
- -Certified Ethical Hacker (CEH)
- -CompTIA's Security Plus (SEC+)
- -Intelligence Analyst Certified (IAC)
- -Certified Threat Intelligence Analyst (C|TIA)
Description
About ARSIEM Corporation
At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.
As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.
ARSIEM is looking for a Cyber Incident Manager. This position will support one of our Government clients in Arlington, VA.
Responsibilities
Proactively gather, analyze, and disseminate timely and accurate CTI to support operational decision-making Identify emerging cyber threats, vulnerabilities, trends, and recommend countermeasures Collaborate with internal and external stakeholders to mitigate cyber threats Improve VM capabilities and knowledge base through training and research Ingest and analyze information from various classified and unclassified sources Produce written reports summarizing gathered CTI Conduct in-person and virtual briefings on vulnerabilities or threat actors Identify intelligence gaps, specify collection requirements to fill gaps in information, and evaluate resulting intelligence requirements
Minimum Qualifications BS Intelligence, Cybersecurity or related degree, or High School Diploma and 4 years of directly relevant experience. 2+ years of directly relevant experience Good understanding of intelligence analytical methods and sources Demonstrated ability to integrate cyber security related data from relevant sources into investigative or analytical products Ability to work within a multi-disciplined team Must be able to work collaboratively across agencies and physical locations Must have experience using multiple Intelligence Community database search tools and familiarity with intelligence monitoring, collection, targeting and reporting Must have working familiarity with Intelligence Community management of information, classification, dissemination and information and records system Must have working familiarity with Open-Source Intelligence sources including the use of scraping tools and darkweb browsers Must have sufficient technical knowledge to perform analysis on intelligence information to determine operational priorities
Preferred Qualifications
Experience supporting Intelligence and/or DoD Customers Experience performing network security or application security Excellent verbal and writing skills Certified Ethical Hacker (CEH) CompTIA’s Security Plus (SEC+) Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst (C|TIA)