×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

CSIRT Engineer; HYBRID

Job in Chevy Chase, Montgomery County, Maryland, 20815, USA
Listing for: GEICO
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 75000 USD Yearly USD 75000.00 YEAR
Job Description & How to Apply Below
Position: CSIRT Engineer (HYBRID)

CSIRT Engineer (HYBRID) – GEICO

Join to apply for the CSIRT Engineer (HYBRID) role at GEICO

5 days ago Be among the first 25 applicants

This range is provided by GEICO. Your actual pay will be based on your skills and experience — talk with your recruiter to learn more.

Base pay range

$75,000.00/yr - $/yr

At GEICO, we offer a rewarding career where your ambitions are met with endless possibilities.

Every day we honor our iconic brand by offering quality coverage to millions of customers and being there when they need us most. We thrive through relentless innovation to exceed our customers’ expectations while making a real impact for our company through our shared purpose.

When you join our company, we want you to feel valued, supported and proud to work here. That’s why we offer The GEICO Pledge:
Great Company, Great Culture, Great Rewards and Great Careers.

GEICO’s Cybersecurity Incident Response Team is looking for a highly motivated, confident, decisive, experienced Incident Response Engineer. As a member of CSIRT, you will be the front‑line responder combating cybersecurity threats against GEICO and their customers by handling security events. You will be challenged with rapidly changing incidents where attackers use the latest cutting‑edge technology in their attempt to compromise GEICO.

You will conduct incident response activities and be involved in complex investigations (cloud response, malware analysis, threat actor analysis and attribution, root cause analysis), response, and remediation.

Responsibilities
  • Identify, detect, respond, and mitigate sophisticated threats to GEICO
  • Perform incident response functions including:
    • Responding to cloud‑based incidents in AWS, Azure, and GCP
    • Host‑based analysis of Windows, Linux and Mac operating systems
    • Examine data collected from a variety of tools and sources (e.g., IDS alerts, firewall logs, web logs, network traffic logs) to identify IOCs and/or malicious TTPs
  • Review/Comprehend log data and apply use case scenarios in effort to further develop threat detection and incident response capabilities
  • Analyze events that occur within their environments for the purposes of mitigating threats
Required Qualifications
  • 4+ years of Incident Response experience
  • Knowledge of digital forensics and incident response best practices
  • Experience with responding to cloud‑based incidents
  • Demonstrated experience performing root cause analysis of security events and incidents
  • Knowledgeable with security frameworks (e.g., MITRE ATT&CK framework)
  • Ability to understand security control mechanisms for Windows, Linux, and Mac operating systems
  • Knowledge of computer networking concepts and protocols, and network security methodologies
  • Knowledge of common threat actor TTPs
  • Proficient in scripting languages such as Bash, Python, Perl, and Power Shell
  • Ability to apply strong critical thinking, logic, decision making, troubleshooting, and problem‑solving skills
  • Strong written and oral communication skills
  • Ability to work independently and as a team member
  • Ability to handle advanced‑level triage and troubleshooting
  • Ability to produce technical documentation, such as Visio flows and processes
  • Ability to understand complex problems while presenting them simplistically in a formal setting
  • Ability to learn and apply large amounts of technical and procedural information, and to follow published standards and processes.
  • Ability to follow complex instructions, resolve conflicts or facilitate conflict resolution, and have strong organization/priority setting skills.
  • Ability to analyze Windows systems for changes that occur during a specific timeframe.
  • Ability to analyze network packet captures
  • Knowledge of cloud computing technologies and concepts (SaaS, PaaS, IaaS, etc.)
  • Knowledge in cyber defense systems and mechanisms (e.g., NIPS, anti‑malware, restrict/prevent external devices, spam filters)
Desired Certifications (at Least One)
  • GIAC Cloud Security Essentials Certification (GCLD)
  • GIAC Cloud Forensics Responder (GCFR)
  • GIAC Certified Web Application Defender (GWEB)
  • GIAC Cloud Security Automation (GCSA)
  • GIAC Certified Incident Handler (GCIH)
  • GIAC Certified Forensic Examiner (GCFE)
    GIAC Certified Forensic Analyst (GCFA)
  • GIAC…
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary