×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior Cybersecurity Incident Response Specialist

Job in Macon, Bibb County, Georgia, 31297, USA
Listing for: Bering Straits Native Corporation (BSNC)
Full Time position
Listed on 2025-12-10
Job specializations:
  • IT/Tech
    Cybersecurity
Salary/Wage Range or Industry Benchmark: 60000 - 80000 USD Yearly USD 60000.00 80000.00 YEAR
Job Description & How to Apply Below

Senior Cybersecurity Incident Response Specialist

Join to apply for the Senior Cybersecurity Incident Response Specialist role at Bering Straits Native Corporation (BSNC)

Bering Professional Services (BSPS), a company within the BSNC family, is currently seeking a Senior Cybersecurity Incident Response Specialist to work with our federal client. The ideal candidate for this job will serve as an incident responder on the federal agency client’s in‑house Security Operations Center (SOC) team within the client’s Cybersecurity Division – Cyber Integration Center. A highly motivated individual with strong technical, communication, and analytical skills will succeed on this program.

Essential Duties & Responsibilities
  • Member of the SOC team which provides 24 hours per day, 7 days per week, 365 days per year monitoring and incident response services for the organization’s Network, Systems, Applications, and Web services.
  • Provide senior level cybersecurity incident response expertise in support of the client’s Incident Response processes and procedures.
  • Develop operational baselines such data flows and application interactions to enhance SOC’s ability to respond to incidents.
  • Prepare and manage playbooks and relevant scenarios in addition to narratives and visual diagrams and review continuously, in compliance with NIST SP 800-61 and Government guidance.
  • Follow current guidance from NIST 800-61, Federal Incident Notification Guidelines, CISA’s Incident Response and Vulnerability Playbook, and client guidance.
  • Monitor system status and sensor data from deployed sensors and triage for validity from Security Information and Event Management (SIEM) System, email, texts, phone calls and all enterprise managed dashboards.
  • Analyze all sources including network traffic, identity, fault, performance, and bandwidth information, alerts and data to augment detection of network anomalies and unauthorized activity.
  • Meet regularly with client stakeholders to develop content, analytic rules, alerts, dashboards, automation and identify ways to improve availability and efficiency of client’s incident response program.
  • Categorize, Prioritize, and Report on cybersecurity events in accordance with (IAW) SOPs and other relevant policies documents.
  • Implement cybersecurity mitigations leveraging client tools and systems.
  • Create and elevate cybersecurity-related investigations to both internal and external entities such as DHS or other Government Agencies with client and Federal defined timelines.
  • Manage, coordinate, and respond to FOIA, audits, data calls, e‑discovery and information requests.
  • Schedule and execute incident response tabletop exercises with each client FISMA system on an annual basis.
  • Review and handle phishing messages reported by client staff.
Qualifications - Experience, Education And Certification

To perform this job successfully, an individual must be able to satisfactorily perform each essential duty. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Required (Minimum Necessary) Qualifications
  • High School or GED – General Educational Development – GED Diploma
  • Bachelor’s degree in computer science or equivalent is preferred
  • Minimum of five years hands‑on experience
  • Proven experience detecting, triaging, and responding to cyber incidents across enterprise networks and cloud environments.
  • Proficiency with SIEM, EDR/XDR platforms, and forensic tools.
  • Strong understanding of threat actor TTPs, MITRE ATT&CK framework, and incident containment strategies.
  • Ability to analyze network traffic, logs, and endpoint telemetry to identify malicious activity.
  • Familiarity with malware analysis, reverse engineering basics, and memory analysis concepts
  • Experience developing and tuning detection rules, playbooks, and automated response workflows.
  • Working knowledge of incident response frameworks (e.g., NIST SP 800-61, SANS).
  • Understanding of vulnerability management, threat intelligence integration, and SOC metrics/reporting.
  • Understanding of basic computer and networking technologies.
  • Window…
Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary