×
Register Here to Apply for Jobs or Post Jobs. X
More jobs:

Senior Cybersecurity Incident Response Specialist

Job in Macon, Bibb County, Georgia, 31297, USA
Listing for: Bering Straits Native Corporation
Full Time position
Listed on 2026-01-02
Job specializations:
  • IT/Tech
    Cybersecurity
Job Description & How to Apply Below

SUMMARY

Bering Professional Services (BSPS), a company within the BSNC family, is currently seeking a seeking a Senior Cybersecurity Incident Response Specialist to work with our federal client. The ideal candidate for this job will serve as an incident responder on the federal agency client’s in-house Security Operations Center (SOC) team within the client’s Cybersecurity Division – Cyber Integration Center. A highly motivated individual with strong technical, communication, and analytical skills will succeed on this program.

ESSENTIAL DUTIES & RESPONSIBILITIES

The Essential Duties and Responsibilities are intended to present a descriptive list of the range of duties performed for this position and are not intended to reflect all duties performed within the job. Other duties may be assigned.

  • Member of the SOC team which provides 24 hours per day, 7 days per week, 365 days per year monitoring and incident response services for the organization’s Network, Systems, Applications, and Web services.
  • Provide senior level cybersecurity incident response expertise in support of the client’s Incident Response processes and procedures.
  • Develop operational baselines such data flows and application interactions to enhance SOC’s ability to respond to incidents.
  • Prepare and manage playbooks and relevant scenarios in addition to narratives and visual diagrams and review continuously, in compliance with NIST SP 800-61 and Government guidance.
  • Follow current guidance from NIST 800-61, Federal Incident Notification Guidelines, CISA’s Incident Response and Vulnerability Playbook, and client guidance.
  • Monitor system status and sensor data from deployed sensors and triage for validity from Security Information and Event Management (SIEM) System, email, texts, phone calls and all enterprise managed dashboards.
  • Analyze all sources including network traffic, identity, fault, performance, and bandwidth information, alerts and data to augment detection of network anomalies and unauthorized activity.
  • Meet regularly with client stakeholders to develop content, analytic rules, alerts, dashboards, automation and identify ways to improve availability and efficiency of client’s incident response program.
  • Categorize, Prioritize, and Report on cybersecurity events in accordance with (IAW) SOPs and other relevant policies documents.
  • Implement cybersecurity mitigations leveraging client tools and systems.
  • Create and escalate cybersecurity-related investigations to both internal and external entities such as DHS or other Government Agencies with client and Federal defined timelines.
  • Manage, coordinate, and respond to FOIA, audits, data calls, e-discovery and information requests.
  • Schedule and execute incident response tabletop exercises with each client FISMA system on an annual basis.
  • Review and handle phishing messages reported by client staff.

QUALIFICATIONS - EXPERIENCE, EDUCATION AND CERTIFICATION

To perform this job successfully, an individual must be able to satisfactorily perform each essential duty. The requirements listed below are representative of the knowledge, skill and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.

Required (Minimum Necessary) Qualifications

  • High School or GED-General Educational Development-GED Diploma
  • Bachelor’s degree in computer science or equivalent is preferred
  • Minimum of five years hands-on experience

• Proven experience detecting, triaging, and responding to cyber incidents across enterprise networks and cloud environments.

• Proficiency with SIEM, EDR/XDR platforms, and forensic tools.

• Strong understanding of threat actor TTPs, MITRE ATT&CK framework, and incident containment strategies.

• Ability to analyze network traffic, logs, and endpoint telemetry to identify malicious activity.

• Familiarity with malware analysis, reverse engineering basics, and memory analysis concepts

• Experience developing and tuning detection rules, playbooks, and automated response workflows.

• Working knowledge of incident response frameworks (e.g., NIST SP 800-61, SANS).

• Understanding of vulnerability management, threat intelligence…

Position Requirements
10+ Years work experience
To View & Apply for jobs on this site that accept applications from your location or country, tap the button below to make a Search.
(If this job is in fact in your jurisdiction, then you may be using a Proxy or VPN to access this site, and to progress further, you should change your connectivity to another mobile device or PC).
 
 
 
Search for further Jobs Here:
(Try combinations for better Results! Or enter less keywords for broader Results)
Location
Increase/decrease your Search Radius (miles)

Job Posting Language
Employment Category
Education (minimum level)
Filters
Education Level
Experience Level (years)
Posted in last:
Salary