Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Military Fellowship - Cyber Security Incident Commander

Learn more about Verizon
Verizon

Verizon

Military Fellowship - Cyber Security Incident Commander

Branchburg, NJ +1 location
Full Time
Paid
  • Responsibilities

    When you join Verizon

    Verizon is one of the world’s leading providers of technology and communications services, transforming the way we connect around the world. We’re a human network that reaches across the globe and works behind the scenes. We anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together—lifting up our communities and striving to make an impact to move the world forward. If you’re fueled by purpose, and powered by persistence, explore a career with us. Here, you’ll discover the rigor it takes to make a difference and the fulfillment that comes with living the #NetworkLife.

    What you’ll be doing...

    The position is required to ensure the confidentiality, integrity and availability of Verizon’s networks.

    The Network Cybersecurity Center (NCC) Incident Commander role is a senior level position that provides an opportunity to work in a fast-paced, collaborative environment where job number one is defending Verizon’s networks from cyber threats. This position plays a critical role in Verizon’s network cybersecurity defense strategy. The Incident Commander is considered a thought leader, should be willing to mentor and advise others, and ensures operational excellence within the Network Security organization. The position is responsible for overseeing the preparation, detection, containment, remediation, recovery and lessons learned tasks detailed in Verizon’s Network Security Incident Response plan.

    • Manage incident response activities for high impact cyber incidents

    • Analyze indicators of compromise to define scope and impact of incident

    • Oversee forensics data gathering and analysis activities within incident scope

    • Document incident artifacts and actions taken in the workflow management tool

    • Engage and collaborate with peer groups during incidents

    • Contain each incident by coordinating countermeasures

    • Maintain ongoing communication with business stakeholders throughout incident lifecycle

    • Identify, evaluate, and effectively communicate to stakeholders the risk of deploying countermeasures and compensating controls

    • Work directly with stakeholders and senior leadership to drive resolution during incidents and improve overall response for future incidents

    • Lead cross-functional post-incident process reviews to ensure continuous improvement of operations and execution

    • Oversee the restoration of services after incident containment

    • Document lessons learned to improve security posture and prevent future occurrences

    • Enhance NCC workflow and process maturity through automation, training, and reviews

    • Serve as a subject matter expert on strategic projects to better identify, protect, detect, respond, and recover from cyber incidents

    • Provide training and mentoring of team members

    • Availability to respond to major incidents after hours as appropriate, including nights and weekends

    What we’re looking for...

    You’ll need to have:

    • Must be a current participant of the Department of Defense Skillbridge Program or of the Hiring our Heroes Corporate Fellowship Program Cohort 2-2024.

    • Bachelor's degree or seven or more years of work experience

    • Experience in Cybersecurity, Incident Response, Digital Forensics or Intelligence

    • Strong TCP/IP networking knowledge and experience working with common network protocols and services, and popular operating systems and services

    • Ability to effectively interact with system and network administrators, systems users, and non-technical senior stakeholders

    • General working knowledge of core concepts of encryption such as TLS, PKI, key and certificate management, and their best practice implementation

    • Strong general knowledge of network infrastructure and design concepts

    • Working knowledge and conceptual understanding of numerous daemons, protocols, applications, such as: forward and reverse proxy servers, web servers such as Apache, NGINX, Lighttpd, etc., web application firewalls (WAFs), mail servers relational databases such as MariaDB/MySQL, PostgreSQL, MS-SQL, etc., HTTP protocols, virtualization, containerization, netflow analysis, packet capturing and analysis, firewalls, ACLs, VPNs, and similar

    • Working knowledge of API concepts, usage, best practices, and API cybersecurity

    Even better if you have one or more of the following:

    • Security certifications such as: GCIH, GCIA, GCFA, GCFE, CISSP, Splunk Power User

    • Experience managing all aspects of the cybersecurity incident handling process

    • Bachelor’s degree in Cybersecurity, Information Systems or Computer Science

    • Experience with an Internet Service Provider or telecommunications company

    • Experience executing Incident Response frameworks

    • Demonstrable knowledge of networking, operating systems, and cloud technologies

    • Splunk Enterprise Security or similar SIEM experience

    • Experience in providing high visibility reporting to executive leadership, especially amidst elevated threat conditions

    • Strong Operating system and application skills, including security hardening

    • Experience with host-based protections, firewalls, proxies, load balancers and other network technologies

    • Familiarity with forensic analysis and big data concepts

    • Be self-motivated in following up on issues

    • Traditional network monitoring experience is preferred with packet/protocol analysis and hands-on system or network administrative experience with major operating systems

    • Excellent written and verbal communication skills

    • Experience leading and managing technical projects initiated from incident lessons learned

    • Ability to manage and allocate resources effectively in high impact, high visibility scenarios

    • Extensive knowledge of cybersecurity best practices and hygiene

    • An analytical mindset is critical

    • An enthusiasm for information security and the ability to learn new threats independently

    If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above.

    Where you’ll be working

    In this hybrid role, you'll have a defined work location that includes work from home and assigned office days set by your manager.

    Scheduled Weekly Hours

    40

    Equal Employment Opportunity

    We’re proud to be an equal opportunity employer - and celebrate our employees’ differences, including race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability, and Veteran status. At Verizon, we know that diversity makes us stronger. We are committed to a collaborative, inclusive environment that encourages authenticity and fosters a sense of belonging. We strive for everyone to feel valued, connected, and empowered to reach their potential and contribute their best. Check out our diversity and inclusion page to learn more.

  • Industry
    Information Technology and Services
  • Locations
    Branchburg, NJ • Richardson, TX
  • About Us

    At Verizon, we're a human network, connected across the globe and working behind the scenes. Our V Teamers lift up communities and make an impact while enjoying the flexibility to focus on the passions that matter most. That’s life in the #NetworkLife.