Agile Defense

Cyber Security Incident Handler - Associate

Agile Defense Fort Huachuca, AZ Today
security
At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.

Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 1387
Job Tittle: Cyber Security Incident Handler - Associate
Location: Ft. Huachuca, AZ
Clearance: Must be able to obtain and maintain a Secret security clearance.
Required Certifications:
Candidates must possess one of the following certifications prior to start date:
· CompTia Security+, Certified Ethical Hacker (CEH), CYSA+


Summary

We are seeking a motivated and detail-oriented Associate Incident Handler to begin their career with our 24x7 security operations team. The ideal candidate will have a foundational understanding of cybersecurity principles and an eagerness to learn. In this role, you will be responsible for monitoring security alerts, performing initial event triage, and following established procedures to support incident response activities. You will work closely with intermediate & senior analysts to investigate and resolve security events, contributing directly to the protection of our organization. This is an excellent opportunity for an emerging cyber professional to gain hands-on experience, with a preference for candidates who have familiarity with Enterprise, military or Department of War (DOW) operational environment.

Key Responsibilities

The Associate Incident Handler will perform essential functions including, but not limited to:
· Alert Monitoring and Triage: Continuously monitor the security alert queue from SIEM, EDR, and other security tools, performing initial analysis to classify and prioritize events according to established procedures.
· Initial Response and Escalation: Execute initial response steps based on documented playbooks for common security events. Accurately escalate qualified incidents to intermediate and senior handlers when necessary.
· Incident Documentation: Meticulously document all analysis and actions taken in the incident management system, ensuring a clear and concise record of the initial response effort.
· Following Defined Procedures: Adhere strictly to standard operating procedures (SOPs) for incident handling, containment, and reporting.
· Team Collaboration: Assist senior team members in their investigation of more complex incidents by gathering data, running pre-defined queries, and performing assigned tasks.

Required Qualifications

· Experience: 0-2 years of experience in IT, cybersecurity, or a related technical role. Internships or academic projects in cybersecurity are highly valued.
· An associate’s degree in cyber security or related field can replace the experience requirements.
· Core Knowledge: Foundational understanding of cybersecurity principles (e.g., CIA Triad), common network protocols (TCP/IP), and operating systems (Windows/Linux).
· Tool Experience: Familiarity with the purpose of security tools such as SIEM and Endpoint Detection and Response (EDR) platforms.
· Skills: Strong eagerness to learn, detail-oriented, with developing analytical and problem-solving abilities.
· Communication: Good written and verbal communication skills, with the ability to clearly document actions and escalate issues.
· Environment: Ability to work effectively in a structured, 24x7 shift-based operational environment and follow defined procedures meticulously.

Preferred Qualifications (A Strong Plus)

· Military/DoD Experience: Familiarity with U.S. military policies, procedures, and organizational structures.
· Cyber Security Controls: Foundational understanding of cybersecurity controls and the importance of adhering to security policies in a professional environment.
· Network Analysis: Basic experience reviewing network activity logs and an understanding of common network protocols (e.g., DNS, HTTP, SMB).
· Endpoint Security: Familiarity with reviewing security events from standard endpoint platforms (e.g., antivirus, host firewalls).
· Tool Familiarity: Exposure to or academic experience with some of the following tools:
· A SIEM platform (e.g., Splunk, Kibana, Sentinel)
· MDE EDR platform and or KQL
· ServiceNow or another ticketing system
· Linux Command Line
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. 

What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.

Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.

Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.

Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.

Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.

Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.

Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

Sponsored

Explore Security

Skills in this job

People also search for