Agile Defense
Cyber Security Engineer
Agile Defense, Ashburn, Virginia, United States, 22011
Agile Defense
At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions.At Agile Defense, we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.Requisition #:
578Job Title:
Cyber Security EngineerLocation:
22001 Loudoun County Pkwy Ashburn, Virginia 20147Clearance Level:
Active DoD - Background CheckRequired Certification(s):CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+GPEN – Penetration TesterGWAPT – Web Application Penetration TesterGSNA – System and Network AuditorGISF – Security FundamentalsGXPN – Exploit Researcher and Advanced Penetration TesterGWEB – Web Application DefenderGNFA – Network Forensic AnalystGMON – Continuous Monitoring CertificationGCTI – Cyber Threat IntelligenceGOSI – Open Source IntelligenceOSCP (Certified Professional)OSCE (Certified Expert)OSWP (Wireless Professional)OSEE (Exploitation Expert)CCFP – Certified Cyber Forensics ProfessionalCISSP – Certified Information Systems SecurityCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorLPT – Licensed Penetration TesterCSA – EC Council Certified SOC AnalystENSA – EC-Council Network Security AdministratorECIH – EC-Council Certified Incident HandlerECSS – EC-Council Certified Security SpecialistECES – EC-Council Certified Encryption SpecialistSUMMARY:
The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain, and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection, and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.We are seeking an experienced Cyber Countermeasures Engineer to join our team. As a member of this highly technical team supporting our client, you will play a crucial role in defending against cyber threats and will perform in-depth technical analysis of network and endpoint logs & activity, direct and track enterprise countermeasure actions, implement countermeasures across a broad spectrum of network and host-based tools, and assess/validate the efficacy of countermeasure deployment in support of the protection of the customers’ systems, networks, and assets.JOB DUTIES AND RESPONSIBILITIES:Directing, tracking, and implementing enterprise-wide countermeasures across a wide spectrum of endpoint, network, and cloud-based tools.Assessing, validating, and ensuring deployment and continuous efficacy of deployed countermeasures in the environment.Create, recommend, and assist with the development of new security content as the result of coordination with other teams, to include signatures, alerts, workflows, and automation.Develop new processes, procedures, and playbooks for countermeasure implementation as new technologies are deployed in the environment.Understand intrusion sets, TTPs, and threat actors to better tailor countermeasure deployment across the enterprise.Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing new tools and processes for countermeasure deployment to enhance cybersecurity posture of the organization’s IT operating environment.Coordinate with various other teams and stakeholders to maintain their situational awareness of countermeasure deployment.Collect and report metrics surrounding countermeasure deployment on a weekly, monthly, and annual basis.Assess, analyze, and effectively communicate risks associated with various types of countermeasures and their deployment in the environment.Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise.Proactively and iteratively search through systems and networks to detect advanced threats and escalate as necessary, or recommend countermeasures for implementation.Analyze host, network, and application logs in addition to malware and code.Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.Produce high-quality technical and non-technical reports with minimal supervision and emphasis on effective/accurate reporting.QUALIFICATIONS:Required Certifications:
The candidate should have at minimum ONE of the following certifications:CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+GPEN – Penetration TesterGWAPT – Web Application Penetration TesterGSNA – System and Network AuditorGISF – Security FundamentalsGXPN – Exploit Researcher and Advanced Penetration TesterGWEB – Web Application DefenderGNFA – Network Forensic AnalystGMON – Continuous Monitoring CertificationGCTI – Cyber Threat IntelligenceGOSI – Open Source IntelligenceOSCP (Certified Professional)OSCE (Certified Expert)OSWP (Wireless Professional)OSEE (Exploitation Expert)CCFP – Certified Cyber Forensics ProfessionalCISSP – Certified Information Systems SecurityCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorLPT – Licensed Penetration TesterCSA – EC Council Certified SOC AnalystENSA – EC-Council Network Security AdministratorECIH – EC-Council Certified Incident HandlerECSS – EC-Council Certified Security SpecialistECES – EC-Council Certified Encryption SpecialistEducation, Background, and Years of Experience:
Have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics.ADDITIONAL SKILLS & QUALIFICATIONS:Required Skills:Must be a US citizen, no clearance required and in addition, must have a current or be able to favorably pass a (BI) Background Investigation to join this program.Possess a minimum of four (4) years of professional experience in incident detection and response, malware analysis, or cyber forensics.Experience with various host, network, cloud, email, and mobile-based technologies and tools related to detections and countermeasures.Have 2+ years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.Established experience with incident response and SIEM tools, host-based logs, network-based logs, and regex.Ability to work independently with minimal direction; self-starter/self-motivated.Preferred Skills:A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience.Demonstrated experience implementing countermeasures across a broad array of endpoint, network, and cloud-based technologies/tools.Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers, and tools such as EDR, DLP, and Mobile Threat Detection.Working knowledge of common (HTTP, DNS, SMB, etc.) networking protocols.Familiarity with operation of both Windows and Linux-based systems.Proficient with scripting languages such as Python or PowerShell.Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL).WORKING CONDITIONS:Environmental Conditions:
Monday - Friday, regular business hours; Hybrid position.Strength Demands:
Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.Physical Requirements:
Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull.Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together.Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.
#J-18808-Ljbffr
At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions.At Agile Defense, we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.Requisition #:
578Job Title:
Cyber Security EngineerLocation:
22001 Loudoun County Pkwy Ashburn, Virginia 20147Clearance Level:
Active DoD - Background CheckRequired Certification(s):CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+GPEN – Penetration TesterGWAPT – Web Application Penetration TesterGSNA – System and Network AuditorGISF – Security FundamentalsGXPN – Exploit Researcher and Advanced Penetration TesterGWEB – Web Application DefenderGNFA – Network Forensic AnalystGMON – Continuous Monitoring CertificationGCTI – Cyber Threat IntelligenceGOSI – Open Source IntelligenceOSCP (Certified Professional)OSCE (Certified Expert)OSWP (Wireless Professional)OSEE (Exploitation Expert)CCFP – Certified Cyber Forensics ProfessionalCISSP – Certified Information Systems SecurityCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorLPT – Licensed Penetration TesterCSA – EC Council Certified SOC AnalystENSA – EC-Council Network Security AdministratorECIH – EC-Council Certified Incident HandlerECSS – EC-Council Certified Security SpecialistECES – EC-Council Certified Encryption SpecialistSUMMARY:
The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain, and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection, and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.We are seeking an experienced Cyber Countermeasures Engineer to join our team. As a member of this highly technical team supporting our client, you will play a crucial role in defending against cyber threats and will perform in-depth technical analysis of network and endpoint logs & activity, direct and track enterprise countermeasure actions, implement countermeasures across a broad spectrum of network and host-based tools, and assess/validate the efficacy of countermeasure deployment in support of the protection of the customers’ systems, networks, and assets.JOB DUTIES AND RESPONSIBILITIES:Directing, tracking, and implementing enterprise-wide countermeasures across a wide spectrum of endpoint, network, and cloud-based tools.Assessing, validating, and ensuring deployment and continuous efficacy of deployed countermeasures in the environment.Create, recommend, and assist with the development of new security content as the result of coordination with other teams, to include signatures, alerts, workflows, and automation.Develop new processes, procedures, and playbooks for countermeasure implementation as new technologies are deployed in the environment.Understand intrusion sets, TTPs, and threat actors to better tailor countermeasure deployment across the enterprise.Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing new tools and processes for countermeasure deployment to enhance cybersecurity posture of the organization’s IT operating environment.Coordinate with various other teams and stakeholders to maintain their situational awareness of countermeasure deployment.Collect and report metrics surrounding countermeasure deployment on a weekly, monthly, and annual basis.Assess, analyze, and effectively communicate risks associated with various types of countermeasures and their deployment in the environment.Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise.Proactively and iteratively search through systems and networks to detect advanced threats and escalate as necessary, or recommend countermeasures for implementation.Analyze host, network, and application logs in addition to malware and code.Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.Produce high-quality technical and non-technical reports with minimal supervision and emphasis on effective/accurate reporting.QUALIFICATIONS:Required Certifications:
The candidate should have at minimum ONE of the following certifications:CompTIA Cyber Security Analyst (CySA+)CompTIA Linux Network Professional (CLNP)CompTIA Pentest+GPEN – Penetration TesterGWAPT – Web Application Penetration TesterGSNA – System and Network AuditorGISF – Security FundamentalsGXPN – Exploit Researcher and Advanced Penetration TesterGWEB – Web Application DefenderGNFA – Network Forensic AnalystGMON – Continuous Monitoring CertificationGCTI – Cyber Threat IntelligenceGOSI – Open Source IntelligenceOSCP (Certified Professional)OSCE (Certified Expert)OSWP (Wireless Professional)OSEE (Exploitation Expert)CCFP – Certified Cyber Forensics ProfessionalCISSP – Certified Information Systems SecurityCEH – Certified Ethical HackerCHFI – Computer Hacking Forensic InvestigatorLPT – Licensed Penetration TesterCSA – EC Council Certified SOC AnalystENSA – EC-Council Network Security AdministratorECIH – EC-Council Certified Incident HandlerECSS – EC-Council Certified Security SpecialistECES – EC-Council Certified Encryption SpecialistEducation, Background, and Years of Experience:
Have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics.ADDITIONAL SKILLS & QUALIFICATIONS:Required Skills:Must be a US citizen, no clearance required and in addition, must have a current or be able to favorably pass a (BI) Background Investigation to join this program.Possess a minimum of four (4) years of professional experience in incident detection and response, malware analysis, or cyber forensics.Experience with various host, network, cloud, email, and mobile-based technologies and tools related to detections and countermeasures.Have 2+ years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.Established experience with incident response and SIEM tools, host-based logs, network-based logs, and regex.Ability to work independently with minimal direction; self-starter/self-motivated.Preferred Skills:A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience.Demonstrated experience implementing countermeasures across a broad array of endpoint, network, and cloud-based technologies/tools.Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers, and tools such as EDR, DLP, and Mobile Threat Detection.Working knowledge of common (HTTP, DNS, SMB, etc.) networking protocols.Familiarity with operation of both Windows and Linux-based systems.Proficient with scripting languages such as Python or PowerShell.Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL).WORKING CONDITIONS:Environmental Conditions:
Monday - Friday, regular business hours; Hybrid position.Strength Demands:
Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.Physical Requirements:
Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull.Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together.Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.Equal Opportunity Employer/Protected Veterans/Individuals with DisabilitiesThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.
#J-18808-Ljbffr