Logo
Lumen Technologies

Black Lotus Labs Cyber Threat Intelligence Analyst

Lumen Technologies, Columbia, Maryland, United States, 21046


About LumenLumen connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building a culture and company from the people up - committed to teamwork, trust and transparency. People power progress. We're invested in providing the flexibility you need to thrive and deliver lasting impact. Apply now to continue digitally connecting the world and shaping the future.The Role

Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen's unique visibility to hunt and scale discovery of evolving malicious threats as well as provide guidance on mitigations on large networks. Our global visibility into one of the world's largest and most interconnected IP backbones as well as our computing cluster presents exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years. This position will work alongside Black Lotus Labs advanced security researchers, data engineers, malware reverse engineers, data scientists, and our customers to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots. This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening with requirements for in person collaboration at the customer site as needed in Annapolis Junction, Maryland. This position requires an active TS/SCI security clearance.The Main Responsibilities

Research latest threat attacker tools, techniques, and procedures (TTPs) with a goal of automating detection.Analyze attacks and use forensic data and OSINT methods for investigation and development of network signatures.Work with cyber operators, when requested, to conduct in-depth investigations on cyber incidents and provide mitigation guidance.Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana.Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups.Support customer RFIs on incidents and emerging threats.Contribute to deliverables and performance metrics when needed.What We Look For in a Candidate

Desired candidates will have a strong background exhibiting:Bachelor's Degree in Cybersecurity, Computer Science, a related field, or 10yrs equivalent experience.Familiarity with adversary capabilities, infrastructure, and techniques that can be applied in collaboration with supporting teams and partners to discover, track, and defend against the adversaries aggression towards customer networks.Experience using OSINT methods for investigation, including discovering novel threats in malware repositories.Scripting experience with Python and familiarity with distributed computing.Extensive experience hunting threat actors and developing algorithms and techniques to identify new threats from large data sets.Deep knowledge of network-based threats and identifying behaviors without attack payloads.Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages.User-level experience in a Unix-based environment.Well experienced candidates may also have the following skills:Previous work experience with Department of Defense (DoD), Intelligence Community, or other government agencies (e.g., DHS, DOE, VA, etc.).Experience with Spark and distributed computing.Experience developing automation and analysis in Python-based environments.Understanding of static or dynamic analysis of malware.Experience with operational security including SOC, incident response, malware analysis, or IDS/IPS analysis.Preferred:Proficient in analyzing NetFlow data to identify unusual patterns and potential security threats.Interest in conducting trend analysis to uncover patterns and emerging threats, enabling proactive defense strategies.Compensation

The starting salary for this role differs based on the employee's primary work location. Employees typically do not start at the top of the range, though compensation depends on each individual's qualifications.Location Based Pay Ranges$111480 - $167211

in these states: AR, ID, KY, LA, ME, MS, NE, SC, and SD.$117340 - $176013

in these states: AZ, AL, FL, GA, IN, IA, KS, MO, MT, NM, ND, OH, OK, PA, TN, UT, VT, WV, WI, and WY.$123210 - $184815

in these states: CO, HI, MI, MN, NV, NH, NC, OR, and RI.$129080 - $193617

in these states: AK, CA, CT, DE, DC, IL, MD, MA, NJ, NY, TX, VA, and WA.As with the pay range variety that's based on the region of a country, specific offers are determined by various factors such as experience, education, skills, certifications and other business needs.Application Deadline

09/17/2024

#J-18808-Ljbffr