Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Cybersecurity & Infrastructure Security Agency
America's Cyber Defense Agency

Search

 
 
  • Topics
    Cybersecurity Best Practices
    Cyber Threats and Advisories
    Critical Infrastructure Security and Resilience
    Election Security
    Emergency Communications
    Industrial Control Systems
    Information and Communications Technology Supply Chain Security
    Partnerships and Collaboration
    Physical Security
    Risk Management
    How can we help?
    GovernmentEducational InstitutionsIndustryState, Local, Tribal, and TerritorialIndividuals and FamiliesSmall and Medium Businesses
  • Spotlight
  • Resources & Tools
    All Resources & Tools
    Services
    Programs
    Resources
    Training
    Groups
  • News & Events
    News
    Events
    Cybersecurity Alerts & Advisories
    Directives
    Request a CISA Speaker
    Congressional Testimony
  • Careers
    Benefits & Perks
    HireVue Applicant Reasonable Accommodations Process
    Hiring
    Resume & Application Tips
    Students & Recent Graduates
    Veteran and Military Spouses
    Work @ CISA
  • About
    Culture
    Divisions & Offices
    Regions
    Leadership
    Doing Business with CISA
    Contact Us
    Site Links
    Reporting Employee and Contractor Misconduct
    CISA GitHub
Report a Cyber Issue
Breadcrumb
  1. Home
  2. Careers at CISA
Share:

Careers

  • Benefits & Perks
  • HireVue Applicant Reasonable Accommodations Process
  • Hiring
  • Resume & Application Tips
  • Students & Recent Graduates
  • Veteran and Military Spouses
  • Work @ CISA

Cyber Defense Incident Responder

CISA Cyber Defense Incident Responder

This role investigates, analyzes, and responds to cyber incidents within the network environment or enclave.

Personnel performing this role may unofficially or alternatively be called:

  • Incident Handler
  • Incident Responder
  • Incident Response Analyst
  • Incident Response Engineer
  • Incident Response Coordinator
  • Intrusion Analyst
  • Computer Network Defense Incident Responder
  • Computer Security Incident Response Team Engineer

Skill Community: Cybersecurity
Category: Protect and Defend
Specialty Area: Incident Response
Work Role Code: 531

Core Tasks

  • Collect intrusion artifacts (e.g., source code, malware, trojans) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise. (T0278)
  • Coordinate and provide expert technical support to enterprise-wide cyber defense technicians to resolve cyber defense incidents. (T0041)
  • Coordinate incident response functions. (T0510)
  • Monitor external data sources (e.g., cyber defense vendor sites, Computer Emergency Response Teams, Security Focus) to maintain currency of cyber defense threat conditions and determine which security issues may have an impact on the enterprise. (T0503)
  • Perform cyber defense trend analysis and reporting. (T0164)
  • Perform initial, forensically sound collection of images and inspect to discern possible mitigation/remediation on enterprise systems. (T0170)
  • Receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts. (T0214)
  • Write and publish after-action reviews. (T0395)
  • Write and publish cyber defense techniques, guidance, and reports on incident findings to appropriate constituencies. (T0246)

Core Competencies

  • Business Continuity
  • Computer Forensics
  • Computer Network Defense
  • Incident Management
  • Information Systems/Network Security
  • Infrastructure Design
  • System Administration
  • Threat Analysis
  • Vulnerability Assessment

Core Knowledge

  • Knowledge of business continuity and disaster recovery continuity of operations plans. (K0026)
  • Skill in preserving evidence integrity according to standard operating procedures or national standards. (S0047)
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. (K0046)
  • Knowledge of cyber defense and information security policies, procedures, and regulations. (K0157)
  • Skill in protecting a network against malware. (e.g., NIPS, anti-malware, restrict/prevent external devices, spam filters). (S0079)
  • Knowledge of incident categories, incident responses, and timelines for responses. (K0041)
  • Knowledge of incident response and handling methodologies. (K0042)
  • Skill in performing damage assessments. (S0080)
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). (K0179)
  • Skill in securing network communications. (S0077)
  • Skill in using security event correlation tools. (S0173)
  • Knowledge of network services and protocols interactions that provide network communications. (K0034)
  • Knowledge of OSI model and underlying network protocols (e.g., TCP/IP). (K0221)
  • Knowledge of cloud service models and how those models can limit incident response. (K0230)
  • Knowledge of network protocols such as TCP/IP, Dynamic Host Configuration, Domain Name System (DNS), and directory services. (K0230)
  • Knowledge of system administration, network, and operating system hardening techniques. (K0167)
  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). (K0161)
  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation sponsored). (K0162)
  • Knowledge of cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). (K0177)
  • Knowledge of malware analysis concepts and methodologies. (K0259)
  • Skill of identifying, capturing, containing, and reporting malware. (S0003)
  • Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). (K0070)
  • Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. (K0106)
  • Skill in recognizing and categorizing types of vulnerabilities and associated attacks. (S0078)

How To Apply

Join the Mission! CISA is always searching for diverse, talented, and highly motivated professionals to continue its mission of securing the nation's critical infrastructure. CISA is more than a great place to work; our workforce tackles the risks and threats that matter most to the nation, our families, and communities.

To join this mission, visit USAJOBs and/or the DHS Cybersecurity Service to view job announcements and to access the application. Be sure to tailor your resume to the specific job announcement, attach relevant documents, and complete all required assessments.

When applying for CISA's cyber positions, please review CISA's cyber roles above and update your resume to align your experience with the listed competencies. Your resume must also show demonstrated cyber/IT related experience in:

  • Attention to Detail
  • Customer Service
  • Oral Communication
  • Problem Solving

To receive email notifications when new CISA positions are announced, set up a "saved search" on USAJOBs with keyword "Cybersecurity and Infrastructure Security Agency."

Individuals eligible for special hiring authorities may also be considered during CISA's one-stop hiring events or by emailing Veterans@cisa.dhs.gov or Careers@cisa.dhs.gov.

Return to top
  • Topics
  • Spotlight
  • Resources & Tools
  • News & Events
  • Careers
  • About
Cybersecurity & Infrastructure Security Agency
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram
  • RSS
CISA Central 888-282-0870 Central@cisa.dhs.gov
DHS Seal
CISA.gov
An official website of the U.S. Department of Homeland Security
  • About CISA
  • Accessibility
  • Budget and Performance
  • DHS.gov
  • FOIA Requests
  • No FEAR Act
  • Office of Inspector General
  • Privacy Policy
  • The White House
  • USA.gov
  • Website Feedback