Tech Stack
CloudCyber SecurityDNSNFSNode.jsSMTPSplunkTCP/IPTypeScript
About the role
- Node provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities.
- Team personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
- Use information collected from a variety of sources to monitor network activity and analyze it for evidence of suspicious behavior.
- Monitor and analyze to identify and report events that occur, or might occur, within the network, to protect information, information systems, and networks from threats.
- Assist the Government lead in coordinating teams in preliminary incident response investigations
- Assist the Government lead with interfacing with the customer while on site
- Determine appropriate courses of actions in response to identified and analyses anomalous network activity
- Assess network topology and device configurations identifying critical security concerns and providing security best practice recommendations
- Collect network intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and use discovered data to enable mitigation of potential Computer Network Defense incidents
- Analyze identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information
- Collect network device integrity data and analyze for signs of tampering or compromise
- Assist with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements
Requirements
- U.S. Citizenship
- Must have an active TS/SCI clearance
- Must be able to obtain DHS Suitability
- 5+ years of directly relevant experience in network investigations
- In depth knowledge of CND policies, procedures and regulations
- In depth knowledge of TCP/IP protocols
- In depth knowledge of standard protocols – ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc.
- In depth knowledge and experience of Wifi networking
- In depth knowledge and experience of network topologies - DMZ’s, WAN’s, etc.
- Substantial knowledge of Splunk (or other SIEM’s)
- Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
- Knowledge of Computer Network Defense policies, procedures, and regulations
- Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture
- Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Ability to identify and analyze anomalies in network traffic using metadata
- Experience with reconstructing a malicious attack or activity based on network traffic
- Experience examining network topologies to understand data flows through the network
- Must be able to work collaboratively across physical locations
- Substantial knowledge of network device integrity concepts and methodologies (Desired)
- Proficiency with network analysis software (e.g. Wireshark) (Desired)
- Proficiency with carving and extracting information from PCAP data (Desired)
- Proficiency with non-traditional network traffic (e.g. Command and Control) (Desired)
- Proficiency with preserving evidence integrity according to standard operating procedures or national standards (Desired)
- Proficiency with virtualized environments (Desired)
- BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7-9 years of network investigations experience.
- Desired Certifications: DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst, GCIA, GCIH, CSSP Analyst/CSSP Incident Responder, CEH
- SANS GIAC GNFA preferred