ShorePoint is a cybersecurity services firm with a focus on high-profile, high-threat private and public-sector customers who demand experience and proven security models to protect their data. We are seeking a Security Operations and Incident Response Deputy Lead who will collaborate, integrate, and recommend ongoing inprovements for technical cybersecurity operations, threat mitigation, advanced analytics and incident response capabilities. This is a unique opportunity to shape the growth, development and culture of an exciting and emerging company in the cybersecurity market.

 

Roles and Responsibilities

This role will be responsible for performing deputy lead duties in operating and maturing capabilities across SOC and Incident Response support tiers, providing primary leadership to the team responsible for advancing the capabilities in cyber hunt, red teaming, digital forensics and cyber intelligence analysis. Lead a team that provides technical direction for analysis, requirements development and implementation for complex systems. Also provides leadership for the team that provides targeted attack detection and analysis, including the development of custom signatures and log queries and analytics for the identification of targeted attacks. Will make recommendations of organization-wide system improvements, optimization or maintenance efforts for information systems architecture; networking; telecommunications; automation; communications protocols; risk management/electronic analysis; software; lifecycle management; software development methodologies; and modeling and simulation.

 

Required Skills

  • Experience leadings teams of technical experts through complex and fast-paced scenarios
  • Ability to articulate and convey highly technical concepts to executive leadership
  • Experience with NIST Incident Response guidance and how to apply to technical security operations (NIST SP 800-61)
  • Experience with Cyber Threat hunting leveraging Sqrrl
  • Experience with Digital Forensics (application based, mobile device, network and cloud systems)
  • Experience with Content Development within the SIEM (Splunk preferred)
  • Experience with Cyber Threat intelligence, Counterintelligence and Insider Threats
  • Experience with Offensive Cybersecurity to include Red Teaming and Adversarial Simulations
  • Experience with Research and Development to assess enterprise tools, capabilities, and functions and conduct in-depth product and tools research on innovative technologies and techniques
  • Experience reporting on corrective actions on cyber intrusions, exposures and malware incidents, as well as recommendations related to those actions

Desired Skills

  • Experience providing support and leading personnel within a 24x7x365 environment
  • Ability to communicate clearly and concisely
  • Enough recent hands-on experience to be capable of serving as a Tier 3 SOC analyst as needed

Education Requirement

  • Bachelor’s degree in related discipline

Years of Experience Requirement

  • Minimum 12 years of relevant experience, or equivalent combination of education and training that provides the required knowledge, skills and abilities

Location

  • National Capital Region 

Security Clearance

  • Must be a U.S. Citizen

Sound like the job for you?

Send us a link to your resumé or portfolio to become part of our talent pool.

Click here to apply

Warning: Invalid argument supplied for foreach() in /var/www/wp-includes/class-wp-list-util.php on line 157