Arsiem Corporation - Arlington, VA

posted about 2 months ago

Full-time
Arlington, VA
Professional, Scientific, and Technical Services

About the position

ARSIEM Corporation is seeking a Network Forensics Cybersecurity Analyst to support one of our Government clients in Arlington, VA. This role is critical in assisting the Government lead in coordinating teams during preliminary incident response investigations. The analyst will interface with the customer on-site, determining appropriate courses of action in response to identified and analyzed anomalous network activity. The position requires a thorough assessment of network topology and device configurations to identify critical security concerns and provide recommendations for security best practices. The Network Forensics Cybersecurity Analyst will also be responsible for writing and publishing Computer Network Defense (CND) guidance and reports on incident findings to the appropriate constituencies. This includes collecting network intrusion artifacts such as PCAP, domains, URIs, and certificates, and using the discovered data to enable mitigation of potential CND incidents. The analyst will analyze identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on systems and information. Additionally, the role involves collecting network device integrity data and analyzing it for signs of tampering or compromise. Real-time CND incident handling tasks will also be part of the responsibilities, including forensic collections, intrusion correlation, tracking, threat analysis, and advising on system remediation to support onsite engagements. This position offers a unique opportunity to work collaboratively across physical locations and contribute to the security posture of our government clients.

Responsibilities

  • Assists the Government lead in coordinating teams in preliminary incident response investigations
  • Assists the Government lead with interfacing with the customer while on-site
  • Determines appropriate courses of action in response to identified and analyses anomalous network activity
  • Assesses network topology and device configurations, identifying critical security concerns and providing security best practice recommendations
  • Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies
  • Collects network intrusion artifacts (e.g., PCAP, domains, URIs, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents
  • Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information
  • Collects network device integrity data and analyzes for signs of tampering or compromise
  • Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation, and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements

Requirements

  • BS in Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 4-6 years of network investigations experience
  • 2+ years of directly relevant experience in network investigations
  • In-depth knowledge of CND policies, procedures, and regulations
  • In-depth knowledge of TCP/IP protocols
  • In-depth knowledge of standard protocols - ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc.
  • In-depth knowledge and experience of Wi-Fi networking
  • In-depth knowledge and experience of network topologies DMZs, WANs, etc.
  • Substantial knowledge of Splunk (or other SIEM's)
  • Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
  • Knowledge of Computer Network Defense policies, procedures, and regulations
  • Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture
  • Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
  • Ability to identify and analyze anomalies in network traffic using metadata
  • Experience with reconstructing a malicious attack or activity based on network traffic
  • Experience examining network topologies to understand data flows through the network
  • Must be able to work collaboratively across physical locations

Nice-to-haves

  • Substantial knowledge of network device integrity concepts and methodologies
  • Proficiency with network analysis software (e.g., Wireshark)
  • Proficiency with carving and extracting information from PCAP data
  • Proficiency with non-traditional network traffic (e.g., Command and Control)
  • Proficiency in preserving evidence integrity according to standard operating procedures or national standards
  • Proficiency with designing cyber security systems and environments in a Linux and/or Windows environment
  • Proficiency with virtualized environments
  • DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst
  • DoD 8140.01 GCIA, GCIH, CSSP Analyst/CSSP Incident Responder
  • DoD 8140.01 CEH, CSSP Analyst
  • SANS GIAC GNFA preferred

Benefits

  • Referral bonus program for successful candidate placements
  • Equal Opportunity and Affirmative Action Employer
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service