Cybervance seeks a Mid-Level Cyber Defense Incident Responder in Washington, D.C., requiring expertise in incident response and a Secret Clearance.
Responsibilities: Key responsibilities include performing cyber defense incident triage, coordinating incident response functions, analyzing log files, and providing expert support for cyber defense incidents.
Skills: Strong written and verbal communication, knowledge of cyber attack stages, system administration, incident response methodologies, and intrusion detection techniques are essential skills.
Qualifications: Requires a Bachelor's degree and 5+ years’ related experience; certification in cyber defense is also necessary, with preferences for certain credentials.
Location: Washington, D.C., US
Compensation: Not provided by employer. Typical compensation ranges for this position are between $85,000 - $130,000.
Mid-Level Cyber Defense Incident Responder
Washington, D.C.| Full-time
Cybervance is an equal opportunity employer that designs, develops, and manages the successful execution of training programs for government and private sector organizations. Cybervance believes in creating innovative solutions to deliver measured results.
We are looking for a Mid-Level Cyber Defense Incident Response with an active Secret Clearance for an on-site team located in Washington, D.C.
Responsibilities
Responsibilities include, but are not limited to:
Strong written and verbal communication skills.
Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
Knowledge of system administration, network, and operating system hardening techniques.
Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
Ability to apply techniques for detecting host and network-based intrusions using intrusion detection technologies.
Demonstrated ability to interact effectively with senior management and leadership.
Ability to design incident response for cloud service models.
Knowledge of incident categories, incident responses, and timelines for responses.
Knowledge of incident response and handling methodologies.
Knowledge of the common networking and routing protocols (e.g. TCP/IP), services (e.g., web, mail, DNS), and how they interact to provide network communications.
Knowledge of Application Security Risks (e.g. Open Web Application Security Project Top 10 list).
Coordinate incident response functions.
Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents.
Correlate incident data to identify specific vulnerabilities and make recommendations that enable expeditious remediation.
Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats to network security.
Perform cyber defense incident triage, to include determining scope, urgency, and potential impact, identifying the specific vulnerability, and making recommendations that enable
expeditious remediation.
Perform cyber defense trend analysis and reporting.
Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems.
Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).
Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts.
Track and document cyber defense incidents from initial detection through final resolution.
Employ approved defense-in-depth principles and practices (e.g., defense-in-multiple places, layered defenses, security robustness).
Collect intrusion artifacts (e.g., source code, malware, Trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Coordinate with intelligence analysts to correlate threat assessment data.
Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine
which security issues may have an impact on the enterprise.
Qualifications
Bachelor’s degree or higher.
5+ years’ experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, and leading incident handling.
Must have, or be able to obtain within 3 months, one of the following certifications: CERT Certified Computer Security Incident Handler (CSIH), ECC Certified Ethical Hacker (CEH), GIAC
Certified Incident Handler (GCIH), GIAC Information Security Fundamentals (GISF), or ISC2Certified Information System Security Professional (CISSP).
Preferred Qualifications
Experience identifying, capturing, containing, and reporting malware.
Skill in preserving evidence integrity according to standard operating procedures or national
standards.
If an employer mentions a salary or salary range on their job, we display it as an "Employer Estimate". If a job has no salary data, Rise displays an estimate if available.
Experienced IT service delivery leader needed to drive reliable, secure Desktop User Experience services, manage SLAs/KPIs, and lead cross-functional teams in a cleared government-focused environment.
Experienced technical consultant and team lead needed to guide connectivity and implementation for Experian's consumer credit products while mentoring a high-performing technical team.
Experienced Network Engineer needed to administer and maintain Exegy's production and datacenter networks, working hands-on with routing, switching, firewalls and vendor teams.
Senior architect-level leader needed to define and execute enterprise IT architecture strategies that enable secure, scalable, cloud-native and mission-critical systems for DoD and national defense customers.
The Department of Social Services is hiring a Certified Database Administrator IV to lead database administration, design redundant recovery and archiving strategies, and support data-driven initiatives across DSS and collaborating agencies.
A remote US-based partner company is hiring an Information Management Specialist to manage knowledge systems, maintain training/reporting databases, and support interagency information sharing and compliance.
Experienced SAM Business Analyst needed to drive software license optimization, compliance and reporting for ArcheSys' government clients in a fully remote, full-time role.
Western Digital is hiring Summer 2026 IT interns to contribute to automation, DevOps/MLOps, security, or software engineering projects at its San Jose operations.
Lead and scale a hands-on IT operations function—managing devices, support, on-prem systems, and internal cloud tooling—while building processes and a team to support company growth.
Data Center/Infrastructure Migration SME needed to assess IT footprints, define separation approaches, and develop migration wave plans and cost models for a major federal agency on a 3-month 1099 contract.