Sev1Tech
Cyber Threat Hunter - Sr
Sev1Tech, Washington, District of Columbia, us, 20022
Overview/ Job Responsibilities
Sev1Tech is looking for the Cyber Threat Hunter to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety. The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support. Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.
The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The NOSC Cyber is responsible for the overall security of DHS Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.
Sev1Tech seeks a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
Responsibilities include but are not limited to:Manage all aspects of the Cyber-Threat Hunt lifecycle, including creation and improvement of enterprise-specific Threat Models and threat hypotheses, plan and scope Threat Hunt campaigns, missions, and activities against a variety of threat types and identify enterprise defense gaps and propose potential mitigation activitiesPerform Cyber-Threat Hunt missions by identifying and investigating patterns and anomalies in data, suspicious network activities, including access from Outside the Continental United States (OCONUS) or utilization of non-standard credentials, anomalous or suspicious telemetry, and other Cyber Threat IntelligencePro-actively search networks to detect and isolate advanced cybersecurity threats that evade in-place security solutionsRegularly perform advanced analysis and adversary hunting activities to pro-actively uncover evidence of adversary presence on DHS networksFollow incident response procedures for detected insider threat activityCreate Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigationsAuthor, update, and maintain SOPs, playbooks, work instructionsUtilize Threat Intelligence and Threat Models to create threat hypothesesPlan and scope Threat Hunt Missions to verify threat hypothesesPro-actively and iteratively search through systems and networks to detect advanced threatsAnalyze host, network, and application logs in addition to malware and codePrepare and report risk analysis and threat findings to appropriate stakeholdersCreate, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation.Coordinate with different teams to improve threat detection, response, and improve overall security posture of the EnterpriseMinimum Qualifications
Bachelors of in Science, Technology, Engineering, Math or related fieldEight (8) to twelve (12) years of prior relevant experience with a focus on Cyber Security or Masters with six (6) years of prior relevant experienceAt least four (4) years of experience serving as a SOC Analyst and/or Incident Responder Ability to work independently with minimal directionSelf-starter/self-motivatedMust have at least one (1) of the following certifications:SANS GCIH (GIAC Certified Incident Handler)SANS GCFA (GIAC Certified Forensic Analyst)SANS GCFE (GIAC Certified Forensic Examiner)SANS GREM (GIAC Reverse Engineering Malware)SANS GISF (GIAC Information Security Fundamentals)SANS GXPN (GIAC Exploit Researcher and Advanced Penetration Tester)SANS GCTI (GIAC Cyber Threat Intelligence) SANS GOSI (GIAC Open Source Intelligence)SANS GCIA (GIAC Certified Intrusion Analyst)SANS GNFA (GIAC Network Forensic Analyst)SANS GWAPT (GIAC Web Application Pentester)SANS GPEN (GIAC Penetration Tester) Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Wireless Professional (OSWP) Offensive Security Exploitation Expert (OSEE)ISC2 CCFP (Certified Cyber Forensics Professional)ISC2 CISSP (Certified Information Systems Security Professional)
Clearance Requirement: Public Trust clearance or higher; Public Trust clearance with Dept of Homeland Security (DHS) or Customs & Border Protection (CBP) preferredDesired Qualifications
Expertise in network and host-based analysis and investigationDemonstrated experience planning and executing threat hunt missionsUnderstanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancersWorking knowledge of common (HTTP, DNS, SMB, etc) networking protocolsFamiliar with operation of both Windows and Linux based systemsProficient with scripting languages such as Python or PowerShellFamiliarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)Demonstrated experience triaging and responding to APT activitiesExperience working with various technologies and platform such as AWS, Azure, O365, containers, etc.Understanding of current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks
About Sev1Tech LLC
Founded in 2010, Sev1Tech provides IT, engineering, and program management solutions delivery. Sev1Tech focuses on providing program and IT support services to critical missions across Federal and Commercial Clients. Our Mission is to Build better companies. Enable better government. Protect our nation. Build better humans across the country.
Join the Sev1Tech family where you can achieve great accomplishments while fostering a satisfying and rewarding career progression. Please apply directly through the website at: https://www.sev1tech.com/careers/current-openings/#/ #joinSev1tech
For any additional questions or to submit any referrals, please contact: eileen.mckenzie@sev1tech.com
Sev1Tech is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.
Sev1Tech is looking for the Cyber Threat Hunter to play a role on a very large program involving network, cybersecurity, and cloud operations and engineering support services to a government customer with a significant mission for security and public safety. The contract will encompass a wide range of tasks across Program Management; Monitoring, Analysis and Incident Response; Tier 3 Engineering and O&M; and Field Engineering technical support. Work will be executed in the National Capital Region, in Stennis, Mississippi; Chandler, Arizona; and other locations in the U.S and occasionally OCONUS.
The Department of Homeland Security (DHS), Network Operations Security Center (NOSC) Cyber is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to DHS networks through monitoring, intrusion detection and protective security services to DHS information systems including local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers and workstations. The NOSC Cyber is responsible for the overall security of DHS Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations.
Sev1Tech seeks a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
Responsibilities include but are not limited to:Manage all aspects of the Cyber-Threat Hunt lifecycle, including creation and improvement of enterprise-specific Threat Models and threat hypotheses, plan and scope Threat Hunt campaigns, missions, and activities against a variety of threat types and identify enterprise defense gaps and propose potential mitigation activitiesPerform Cyber-Threat Hunt missions by identifying and investigating patterns and anomalies in data, suspicious network activities, including access from Outside the Continental United States (OCONUS) or utilization of non-standard credentials, anomalous or suspicious telemetry, and other Cyber Threat IntelligencePro-actively search networks to detect and isolate advanced cybersecurity threats that evade in-place security solutionsRegularly perform advanced analysis and adversary hunting activities to pro-actively uncover evidence of adversary presence on DHS networksFollow incident response procedures for detected insider threat activityCreate Threat Models to better understand the DHS IT Enterprise, identify defensive gaps, and prioritize mitigationsAuthor, update, and maintain SOPs, playbooks, work instructionsUtilize Threat Intelligence and Threat Models to create threat hypothesesPlan and scope Threat Hunt Missions to verify threat hypothesesPro-actively and iteratively search through systems and networks to detect advanced threatsAnalyze host, network, and application logs in addition to malware and codePrepare and report risk analysis and threat findings to appropriate stakeholdersCreate, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation.Coordinate with different teams to improve threat detection, response, and improve overall security posture of the EnterpriseMinimum Qualifications
Bachelors of in Science, Technology, Engineering, Math or related fieldEight (8) to twelve (12) years of prior relevant experience with a focus on Cyber Security or Masters with six (6) years of prior relevant experienceAt least four (4) years of experience serving as a SOC Analyst and/or Incident Responder Ability to work independently with minimal directionSelf-starter/self-motivatedMust have at least one (1) of the following certifications:SANS GCIH (GIAC Certified Incident Handler)SANS GCFA (GIAC Certified Forensic Analyst)SANS GCFE (GIAC Certified Forensic Examiner)SANS GREM (GIAC Reverse Engineering Malware)SANS GISF (GIAC Information Security Fundamentals)SANS GXPN (GIAC Exploit Researcher and Advanced Penetration Tester)SANS GCTI (GIAC Cyber Threat Intelligence) SANS GOSI (GIAC Open Source Intelligence)SANS GCIA (GIAC Certified Intrusion Analyst)SANS GNFA (GIAC Network Forensic Analyst)SANS GWAPT (GIAC Web Application Pentester)SANS GPEN (GIAC Penetration Tester) Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) Offensive Security Wireless Professional (OSWP) Offensive Security Exploitation Expert (OSEE)ISC2 CCFP (Certified Cyber Forensics Professional)ISC2 CISSP (Certified Information Systems Security Professional)
Clearance Requirement: Public Trust clearance or higher; Public Trust clearance with Dept of Homeland Security (DHS) or Customs & Border Protection (CBP) preferredDesired Qualifications
Expertise in network and host-based analysis and investigationDemonstrated experience planning and executing threat hunt missionsUnderstanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancersWorking knowledge of common (HTTP, DNS, SMB, etc) networking protocolsFamiliar with operation of both Windows and Linux based systemsProficient with scripting languages such as Python or PowerShellFamiliarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)Demonstrated experience triaging and responding to APT activitiesExperience working with various technologies and platform such as AWS, Azure, O365, containers, etc.Understanding of current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks
About Sev1Tech LLC
Founded in 2010, Sev1Tech provides IT, engineering, and program management solutions delivery. Sev1Tech focuses on providing program and IT support services to critical missions across Federal and Commercial Clients. Our Mission is to Build better companies. Enable better government. Protect our nation. Build better humans across the country.
Join the Sev1Tech family where you can achieve great accomplishments while fostering a satisfying and rewarding career progression. Please apply directly through the website at: https://www.sev1tech.com/careers/current-openings/#/ #joinSev1tech
For any additional questions or to submit any referrals, please contact: eileen.mckenzie@sev1tech.com
Sev1Tech is an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, pregnancy, sexual orientation, gender identity, national origin, age, protected veteran status, or disability status.