Please scroll down, To apply

Incident Responder Sr.

hiring now

Dunhill Professional Search

2024-10-03 13:42:15

Job location Germantown, Maryland, United States

Job type: fulltime

Job industry: I.T. & Communications

Job description

This position is to support the Department of Energy! Must obtain a public trust for the position

Position: Remote- Must be located in Germantown, MD area.

Enforces application security in all phases of the software development life cycle. Works closely with team members to define application security best practices, performs software architecture and design reviews, and supports the identification, interpretation, and remediation of vulnerabilities across a variety of applications, programming languages, and platforms.

  • Perform incident response for cyber security incidents within EIA.
  • Act as an escalation point to support security monitoring activities.
  • Collect and analyze pertinent data to support security investigations.
  • Work with System Owners and administrators to effectively contain cyber incidents, eradicate threats, and recover from cyber incidents.
  • Develop, update, communicate, and retain Standard Operating Procedures (SOPs).
  • Coordinate with administrators and technical staff to contain cyber incident.

Minimum Qualifications

  • Bachelor's Degree in Computer Science, Engineering, or other Engineering or Technical discipline or equivalent relevant experience. Master's Degree preferred.
  • 8-15 years of experience as an Application Security Developer, Application Security Analyst, or equivalent.

Other Job Specific Skills

  • Expertise with application server technologies such as Spring Framework, Spring Security, Web Services, REST, and Hibernate.
  • In-depth knowledge of and experience with security technologies, single-sign-on and identity management technologies.
  • Expertise with web system security concepts, including authentication, authorization (RBAC), encryption/hashing, SAML, and LDAP.
  • Advanced knowledge of web application vulnerabilities such as cross-site scripting (XSS), sessions hijacking, SQL injection, CSRF (Cross-Site Request Forgery), OWASP Top 10, and other attack vectors.
  • Hands-on experience with encryption, hashing, secure random number generation, key derivation, digital signatures, etc.
  • Advanced knowledge of network based, system level and application layer attacks and mitigation methods, and TCP/IP, HTTP/S, and related protocols.
  • Experience with static code analysis tools including HP Fortify.
  • Familiarity with JavaScript, NodeJS, or other scripting languages and BurpSuite or other intercepting proxy tools.
  • Experience working with GIT source code management.
  • Must have solid working experience and knowledge of Unix/Linux operating system.
  • Experience with one or more of the following technologies: Vagrant, Chef, Rake, Gradle, Jenkins, and Cache DB.
  • Understanding of Agile/Scrum methodologies is preferred.

Inform a friend!

<!– job description page –>
Top