Threat Hunter with Security Clearance
Apply NowCompany: Base One Technologies
Location: Wash, DC 20032
Description:
Threat Hunt Analyst Jr Primary Responsibilities
The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Cyber Threat Hunter will:
Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations
Author, update, and maintain SOPs, playbooks, work instructions Utilize Threat Intelligence and Threat Models to create threat hypotheses
Plan and scope Threat Hunt Missions to verify threat hypotheses
Proactively and iteratively search through systems and networks to detect advanced threats
Analyze host, network, and application logs in addition to malware and code
Prepare and report risk analysis and threat findings to appropriate stakeholders
Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation
Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise Basic Qualifications NEW REQUIREMENT as of 6/27/2022: In addition to uploading the resume, please email us a copy of the candidates current certifications (actual certificate) as a way to validate that certs are current and active. The ideal candidate will have the following qualifications:
Expertise in network and host based analysis and investigation
Demonstrated experience planning and executing threat hunt missions
Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
Familiar with operation of both Windows and Linux based systems
Proficient with scripting languages such as Python or PowerShell
Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL) The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).
Should have 2 years of experience serving as a SOC Analyst or Incident Responder
Ability to work independently with minimal direction; self-starter/self-motivated Requirement Certifications/One of the following certifications
CCFP Certified Cyber Forensics Professional
CCNA Security
CCNP Security
CEH Certified Ethical Hacker
CHFI Computer Hacking Forensic Investigator
CISSP Certified Information Systems Security
ECES EC-Council Certified Encryption Specialist
ECIH EC-Council Certified Incident Handler
ECSA EC-Council Certified Security Analyst
ECSS EC-Council Certified Security Specialist
EnCE
ENSA EC-Council Network Security Administrator
GCFA Forensic Analyst
GCFE Forensic Examiner
GCIH Incident Handler
GISF Security Fundamentals
GNFA Network Forensic Analyst
GREM Reverse Engineering Malware
GWEB Web Application Defender
GXPN Exploit Researcher and Advanced Penetration Tester
LPT Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSEE (Exploitation Expert)
OSWP (Wireless Professional)
CIRC
FIWE
WFE-E-CI
FTK-WFE-FTK Required Education/Experience
BS degree in Science, Technology, Engineering, Math or related field and 3 years of prior relevant experience with a focus on CyberSecurity or Masters with 1 years of prior relevant experience.
The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious. The Cyber Threat Hunter will:
Create Threat Models to better understand the CBP IT Enterprise, identify defensive gaps, and prioritize mitigations
Author, update, and maintain SOPs, playbooks, work instructions Utilize Threat Intelligence and Threat Models to create threat hypotheses
Plan and scope Threat Hunt Missions to verify threat hypotheses
Proactively and iteratively search through systems and networks to detect advanced threats
Analyze host, network, and application logs in addition to malware and code
Prepare and report risk analysis and threat findings to appropriate stakeholders
Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation
Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise Basic Qualifications NEW REQUIREMENT as of 6/27/2022: In addition to uploading the resume, please email us a copy of the candidates current certifications (actual certificate) as a way to validate that certs are current and active. The ideal candidate will have the following qualifications:
Expertise in network and host based analysis and investigation
Demonstrated experience planning and executing threat hunt missions
Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
Familiar with operation of both Windows and Linux based systems
Proficient with scripting languages such as Python or PowerShell
Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL) The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).
Should have 2 years of experience serving as a SOC Analyst or Incident Responder
Ability to work independently with minimal direction; self-starter/self-motivated Requirement Certifications/One of the following certifications
CCFP Certified Cyber Forensics Professional
CCNA Security
CCNP Security
CEH Certified Ethical Hacker
CHFI Computer Hacking Forensic Investigator
CISSP Certified Information Systems Security
ECES EC-Council Certified Encryption Specialist
ECIH EC-Council Certified Incident Handler
ECSA EC-Council Certified Security Analyst
ECSS EC-Council Certified Security Specialist
EnCE
ENSA EC-Council Network Security Administrator
GCFA Forensic Analyst
GCFE Forensic Examiner
GCIH Incident Handler
GISF Security Fundamentals
GNFA Network Forensic Analyst
GREM Reverse Engineering Malware
GWEB Web Application Defender
GXPN Exploit Researcher and Advanced Penetration Tester
LPT Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSEE (Exploitation Expert)
OSWP (Wireless Professional)
CIRC
FIWE
WFE-E-CI
FTK-WFE-FTK Required Education/Experience
BS degree in Science, Technology, Engineering, Math or related field and 3 years of prior relevant experience with a focus on CyberSecurity or Masters with 1 years of prior relevant experience.