Skip navigation
Unable to save this job. Please try again later.

{msg}

Email this Job to Yourself or a Friend

To begin the application process, please enter your email address.

Company Contact Info

  • Greenbelt, MD
  • Mike Stapinski

Already have an account?

Sign in to apply with your saved resumes.

New to CareerBuilder?

Don't have an account? Continue as a guest!

Sorry, we cannot save or unsave this job right now.

Report this Job

Trust and Site Security Team.

Don't miss out on new jobs!

Get the latest Cyber Security Analyst jobs in Greenbelt, MD delivered directly to your inbox. You can unsubscribe at any time.

Saving Your Job Alert

Job Alert Saved!

Could not save Job Alert!

You have too many Job Alerts!

This email address has reached the maximum of 5 email alerts. To create a new alert, you will need to log into your email and unsubscribe from at least one.

Sign Up

or   Sign In Here
Password Must Contain
• 
8 to 15 characters
• 
1 uppercase letter
• 
1 number or symbol
• 
1 lowercase letter
Cancel
Create an Account with CareerBuilder to save jobs & unlock these great features
See similar job titles and skills to help you make your next move
Upload a resume and become visible to Hiring Managers and Employers
Compare Salary Information to see where you stand amongst your peers
Easily Quick Apply to jobs with just one click!

Email Send Failed!

Active Cyber Defense Analyst – Multiple Levels

Next Step Systems • Greenbelt, MD

Posted 5 days ago

Job Snapshot

Full-Time
Travel - Negligible
Experience - 10 to greater than 15 years
Degree - Graduate Degree
$100,000.00 - $190,000.00 /Year
Computer Hardware, Computer Software, Security
Information Technology, Engineering
Relocation - Yes
2

Applicants

How Do You Compare to the Competition?

Get facts about other applicants with a CareerBuilder Account

Job Description

Active Cyber Defense Analyst – Multiple Levels

 

The ACD Analysts will look through network flow, PCAP, logs, and sensors for evidence of cyber-attack patterns, hunt for Advanced Persistent Threats (APT).

 

  • Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host.
  • Find evidence of attack, and attackers actions thereafter.
  • Work with team to produce effective countermeasures against found evidence.  Also, contributes to mitigations for future attacks of a similar nature.
  • Follow Security Operations Center (SOC) policies, procedures for incident reporting and management.  Create a detailed Incident Report (IR) and contribute to lessons learned.
  • Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800-53 ATO artifacts, Vulnerability scans, Access Control Lists (ACL), and vendor documentation to thoroughly understand software behaviors and interactions.
  • Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs.
  • Study and understand IANA, W3C, IETF and other internet bodies’ protocol RFC definitions to understand violations and security weaknesses.
  • Conduct forensic testing and operational hardening of multiple OS platforms.
  • Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPS/IDS to create and implement a concrete plan of action to harden the defensive posture.
  • Work with SOC shift team to help contain intrusions.
  • Provide detailed requirements to team security engineers, SIEM specialists, and other team capability developers to provide reusable hunt tactics and techniques for other team analysts.
  • Provide detailed input to watchlog and provide thorough pass-down.
  • Generate documentation as required by the US Census.

Job Requirements

Qualifications:

 

  • Bachelor’s Degree in a relevant major from an accredited college or university.
  • 10 to 14+ years of relevant work experience.
  • Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS).
  • Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures.
  • Knowledge of how encryption, key management and cryptology works in the enterprise and in cyber data.
  • Understanding of Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture (SOA), the Open Group Architecture Framework (TOGAF), and/or the Amazon Web Services (AWS) Well Architected Framework.
  • Knowledge in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring).
  • Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation.
  • Expertise in Application Penetration Testing (fuzzing, reverse engineering, Fortify or similar, IDA Pro, Kali, BackTrack, OllyDbg, SQLMap, etc.).
  • Expertise in Proof of Concept (Exploit) development.
  • Understanding of Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, and secure maintenance).
  • Knowledge of Mobile Application Security and MDM sensor data.
  • Expertise in Embedded Device Security.
  • Expertise in Malware Analysis.
  • Expertise in a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (PowerShell, Python, BASH) software development frameworks, operating systems, and networking technologies.  Understanding of various web application frameworks such as ASP.NET, J2EE.

 

Pluses:

 

  • Thorough understanding of network protocol behaviors.  Ability to understand netflow and PCAP.
  • Thorough knowledge of open source tools to visualize PCAP data (Wireshark, TCPDump, etc.).
  • Detailed knowledge of various forms of social engineering, including the ability to recognize and handle spear-phishing campaigns or other forms of social engineering attacks.
  • Comprehensive knowledge of Windows and Linux behaviors, logging, vulnerabilities, exploits, and known attacks.
  • Use of IPSec packet filtering and Windows firewalls with specific application to defense in depth of network based attacks, data corruption, data theft, credential theft, and administrative control.
  • Red Team/Blue Team experience from a federal agency.
  • Certifications:  OSCP, CSSLP, GIAC (GPEN), GIAC (GWAPT), GIAC (GXPN), GIAC (GMOB), GIAC (GAWN), GIAC (GPYC), etc., CFSR, CCNP, MCSE, RHCE.

 

Keywords:  Greenbelt MD Jobs, Active Cyber Defense Analyst, Network Routing, Switching, MPLS, Multiprotocol Layer Switching, Active Directory, Penetration Testing, Malware, Maryland Recruiters, Information Technology Jobs, IT Jobs, Maryland Recruiting

 

If you are an employer and recruiting for similar IT professionals / positions, please contact our Technical Recruiters at Next Step Systems.  We are a national IT Recruiting Firm / Agency specializing in full-time direct hire Information Technology employment opportunities.

 

No Corp-To-Corp Or Third Party Recruiters; W-2 Direct Hire Only.

Help us improve CareerBuilder by providing feedback about this job: Report this Job.
CAREERBUILDER TIP
For your privacy and protection, when applying to a job online, never give your social security number to a prospective employer, provide credit card or bank account information, or perform any sort of monetary transaction. Learn more.
By applying to a job using CareerBuilder you are agreeing to comply with and be subject to the CareerBuilder Terms and Conditions for use of our website. To use our website, you must agree with the Terms and Conditions and both meet and comply with their provisions.
Don't miss out on new jobs like this
Get the latest jobs delivered to your inbox. Unsubscribe at any time.

Saving Your Job Alert

Job Alert Created

Well, this is embarrassing. We are having trouble saving your search. You can try again or come back at a later time.

Maximum Email Alerts

This email address has reached the maximum of 5 email alerts. To create a new alert, you will need to log into your email and unsubscribe from at least one.