TMC Technologies is in search of a Monitoring - SME to support a federal client in Rosslyn, VA. The candidate must be a US Citizen with an active Secret clearance and the ability to obtain Top Secret due to federal contract requirements. The Monitoring SME role will be located in Beltsville, MD and Roslyn, VA. This role supports the Cyber Incident Response Team (CIRT) as a key member of Incident Response Tiger Team. The customer requirement requires every employee to be onsite for the first 90 days. After the 90 day period, a hybrid schedule may be offered. The selected candidate must be able to support a hybrid and flexible schedule, in the event of significant cyber incident a continuous on site presence will be required. The Monitoring - SME, in support of the CIRT mission, will:
- Provide Subject Matter Expert (SME) level Cloud Monitoring support in a 24x7x365 environment.
- Share in-depth knowledge and intelligence gained from cyber security events with stakeholders.
- Protect against and prevent potential cyber security threats and vulnerabilities.
- Provide SME level response, technical assistance and expertise for significant cyber incidents, investigations and related operational events.
- Develop and implement training programs for monitoring analysts.
- Conduct detailed research to increase awareness and readiness levels of the security operations center.
- Conduct advanced analysis and recommend remediation steps.
- Analyze network events to determine impact.
- Conduct all-source research to determine threat capability and intent.
- Develop and maintain analytical procedures to meet changing requirements.
- Coordinate during significant cyber incidents.
- Develop content for cyber defense tools.
- Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
- Determine tactics, techniques, and procedures for intrusion sets.
- Work with stakeholders to resolve computer security incidents and vulnerability compliance.
- Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
- Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.
- Publish after-action reports, cyber defense techniques, guidance, and incident reports.
- Review, draft, edit, update and publish cyber incident response plans.