Cyber Security Engineer

Company:  Agile Defense
Location: Ashburn
Closing Date: 30/10/2024
Salary: £150 - £200 Per Annum
Hours: Full Time
Type: Permanent
Job Requirements / Description

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions.

At Agile Defense, we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next. Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.

Requisition #: 578
Job Title: Cyber Security Engineer
Location: 22001 Loudoun County Pkwy Ashburn, Virginia 20147
Clearance Level: Active DoD - Background Check

Required Certification(s):

  1. CompTIA Cyber Security Analyst (CySA+)
  2. CompTIA Linux Network Professional (CLNP)
  3. CompTIA Pentest+
  4. GPEN – Penetration Tester
  5. GWAPT – Web Application Penetration Tester
  6. GSNA – System and Network Auditor
  7. GISF – Security Fundamentals
  8. GXPN – Exploit Researcher and Advanced Penetration Tester
  9. GWEB – Web Application Defender
  10. GNFA – Network Forensic Analyst
  11. GMON – Continuous Monitoring Certification
  12. GCTI – Cyber Threat Intelligence
  13. GOSI – Open Source Intelligence
  14. OSCP (Certified Professional)
  15. OSCE (Certified Expert)
  16. OSWP (Wireless Professional)
  17. OSEE (Exploitation Expert)
  18. CCFP – Certified Cyber Forensics Professional
  19. CISSP – Certified Information Systems Security
  20. CEH – Certified Ethical Hacker
  21. CHFI – Computer Hacking Forensic Investigator
  22. LPT – Licensed Penetration Tester
  23. CSA – EC Council Certified SOC Analyst
  24. ENSA – EC-Council Network Security Administrator
  25. ECIH – EC-Council Certified Incident Handler
  26. ECSS – EC-Council Certified Security Specialist
  27. ECES – EC-Council Certified Encryption Specialist

SUMMARY: The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain, and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection, and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations.

We are seeking an experienced Cyber Countermeasures Engineer to join our team. As a member of this highly technical team supporting our client, you will play a crucial role in defending against cyber threats and will perform in-depth technical analysis of network and endpoint logs & activity, direct and track enterprise countermeasure actions, implement countermeasures across a broad spectrum of network and host-based tools, and assess/validate the efficacy of countermeasure deployment in support of the protection of the customers’ systems, networks, and assets.

JOB DUTIES AND RESPONSIBILITIES:

  1. Directing, tracking, and implementing enterprise-wide countermeasures across a wide spectrum of endpoint, network, and cloud-based tools.
  2. Assessing, validating, and ensuring deployment and continuous efficacy of deployed countermeasures in the environment.
  3. Create, recommend, and assist with the development of new security content as the result of coordination with other teams, to include signatures, alerts, workflows, and automation.
  4. Develop new processes, procedures, and playbooks for countermeasure implementation as new technologies are deployed in the environment.
  5. Understand intrusion sets, TTPs, and threat actors to better tailor countermeasure deployment across the enterprise.
  6. Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing new tools and processes for countermeasure deployment to enhance cybersecurity posture of the organization’s IT operating environment.
  7. Coordinate with various other teams and stakeholders to maintain their situational awareness of countermeasure deployment.
  8. Collect and report metrics surrounding countermeasure deployment on a weekly, monthly, and annual basis.
  9. Assess, analyze, and effectively communicate risks associated with various types of countermeasures and their deployment in the environment.
  10. Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise.
  11. Proactively and iteratively search through systems and networks to detect advanced threats and escalate as necessary, or recommend countermeasures for implementation.
  12. Analyze host, network, and application logs in addition to malware and code.
  13. Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.
  14. Produce high-quality technical and non-technical reports with minimal supervision and emphasis on effective/accurate reporting.

QUALIFICATIONS:

Required Certifications: The candidate should have at minimum ONE of the following certifications:

  1. CompTIA Cyber Security Analyst (CySA+)
  2. CompTIA Linux Network Professional (CLNP)
  3. CompTIA Pentest+
  4. GPEN – Penetration Tester
  5. GWAPT – Web Application Penetration Tester
  6. GSNA – System and Network Auditor
  7. GISF – Security Fundamentals
  8. GXPN – Exploit Researcher and Advanced Penetration Tester
  9. GWEB – Web Application Defender
  10. GNFA – Network Forensic Analyst
  11. GMON – Continuous Monitoring Certification
  12. GCTI – Cyber Threat Intelligence
  13. GOSI – Open Source Intelligence
  14. OSCP (Certified Professional)
  15. OSCE (Certified Expert)
  16. OSWP (Wireless Professional)
  17. OSEE (Exploitation Expert)
  18. CCFP – Certified Cyber Forensics Professional
  19. CISSP – Certified Information Systems Security
  20. CEH – Certified Ethical Hacker
  21. CHFI – Computer Hacking Forensic Investigator
  22. LPT – Licensed Penetration Tester
  23. CSA – EC Council Certified SOC Analyst
  24. ENSA – EC-Council Network Security Administrator
  25. ECIH – EC-Council Certified Incident Handler
  26. ECSS – EC-Council Certified Security Specialist
  27. ECES – EC-Council Certified Encryption Specialist

Education, Background, and Years of Experience: Have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics.

ADDITIONAL SKILLS & QUALIFICATIONS:

Required Skills:

  1. Must be a US citizen, no clearance required and in addition, must have a current or be able to favorably pass a (BI) Background Investigation to join this program.
  2. Possess a minimum of four (4) years of professional experience in incident detection and response, malware analysis, or cyber forensics.
  3. Experience with various host, network, cloud, email, and mobile-based technologies and tools related to detections and countermeasures.
  4. Have 2+ years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
  5. Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.
  6. Established experience with incident response and SIEM tools, host-based logs, network-based logs, and regex.
  7. Ability to work independently with minimal direction; self-starter/self-motivated.

Preferred Skills:

  1. A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.
  2. Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience.
  3. Demonstrated experience implementing countermeasures across a broad array of endpoint, network, and cloud-based technologies/tools.
  4. Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers, and tools such as EDR, DLP, and Mobile Threat Detection.
  5. Working knowledge of common (HTTP, DNS, SMB, etc.) networking protocols.
  6. Familiarity with operation of both Windows and Linux-based systems.
  7. Proficient with scripting languages such as Python or PowerShell.
  8. Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL).

WORKING CONDITIONS:

Environmental Conditions: Monday - Friday, regular business hours; Hybrid position.

Strength Demands: Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.

Physical Requirements: Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull.

Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together.

Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.

Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant.

#J-18808-Ljbffr
Apply Now
Share this job
Agile Defense
  • Similar Jobs

  • Cyber Security Engineer

    Reston
    View Job
  • Cyber Security Engineer

    Reston
    View Job
  • Cyber Security Engineer

    Reston
    View Job
  • Cyber Security Engineer

    Ashburn
    View Job
  • Cyber Security Engineer

    Reston
    View Job
An error has occurred. This application may no longer respond until reloaded. Reload 🗙