Active Cyber Defense Analyst

Take2 Consulting
Greenbelt, MD
Mar 19, 2019
Mar 20, 2019
Full Time
THIS POSITION IS A MIX OF RED AND BLUE TEAM WORK BUT IS MORE FOCUSED ON RED TEAMPEN TESTINGATTACKING. WOULD LIKE TO SEE SOME SCRIPTING, CUSTOM EXPLOITS, AND THREAT HUNTING. SOME TOOLS BEING USED ARE KALI, METASPLOIT, WIRESHARK, AND N-MAP Position Description The ACD Analyst will look through network flow, PCAP, logs, and sensors for evidence of cyber-attack patterns, hunt for Advanced Persistent Threats (APT). Responsibilities bull Actively hunt for Indicators of Compromise (IOC) and APT Tactics, Techniques, and Procedures (TTP) in network and on host. bull Find evidence of attack, and attackers actions thereafter. bull Work with team to produce effective countermeasures against found evidence. Also, contributes to mitigations for future attacks of a similar nature. bull Follow Security Operations Center (SOC) policies, procedures for incident reporting and management. Create a detailed Incident Report (IR) and contribute to lessons learned. . bull Analyze infrastructure build sheets, Configuration Management Database (CMDB), NIST 800-53 ATO artifacts, Vulnerability scans, Access Control Lists (ACL), and vendor documentation to thoroughly understand software behaviors and interactions. . bull Monitor open source and commercial threat intelligence for IOCs, new vulnerabilities, software weaknesses, and other attacker TTPs. bull Study and understand IANA, W3C, IETF and other internet bodiesrsquo protocol RFC definitions to understand violations and security weaknesses. bull Conduct forensic testing and operational hardening of multiple OS platforms. bull Analyze network perimeter data, flow, packet filtering, proxy firewalls, and IPSIDS to create and implement a concrete plan of action to harden the defensive posture. bull Work with SOC shift team to help contain intrusions. bull Provides detailed requirements to team security engineers, SIEM specialists, and other team capability developers to provide reusable hunt tactics and techniques for other team analysts. bull Provide detailed input to watchlog and provide thorough pass-down. bull Generates documentation as required by the customer. Desired Experience bull Thorough understanding of network protocol behaviors. Ability to understand netflow and PCAP. bull Thorough knowledge of open source tools to visualize PCAP data (Wireshark, TCPDump, etc.). bull Detailed knowledge of various forms of social engineering, including the ability to recognize and handle spear-phishing campaigns or other forms of social engineering attacks. bull Comprehensive knowledge of Windows and Linux behaviors, logging, vulnerabilities, exploits, and known attacks. bull Use of IPSec packet filtering and Windows firewalls with specific application to defense in depth of network based attacks, data corruption, data theft, credential theft, and administrative control. bull Red TeamBlue Team experience from a federal agency Required Skills bull Expert knowledge of network routing and switching fundamentals to include knowledge of Multiprotocol Layer Switching (MPLS) bull Deep technical understanding of operating systems, network architecture and design, Active Directory (AD) application log consumables, systems design as well as superior knowledge of technical operations process and procedures bull Knowledge of how encryption, key management and cryptology works in the enterprise and in cyber data bull Understanding of Enterprise Architecture Standards such as the Department of Defense Architecture Framework (DODAF), Service-Oriented Architecture (SOA), the Open Group Architecture Framework (TOGAF), andor the Amazon Web Services (AWS) Well Architected Framework bull Knowledge in the Risk Management Framework (NIST 800-37), Security Controls as described in NIST 800-35, and the Federal Information Security Modernization Act (FISMA) operating standards and applicable guidelines (risk profiling, control selection, control assessment, control monitoring) bull Expertise in performing threat modelling, risk analysis, root cause analysis, risk identification, and risk mitigation bull Expertise in Application Penetration Testing (fuzzing, reverse engineering, Fortify or similar, IDA Pro, Kali, BackTrack, OllyDbg, SQLMap, etc.) bull Expertise in Proof of Concept (Exploit) development bull Understanding of Secure SDLC (threat modelling, security requirements, secure design, secure implementation, secure testing, secure maintenance) bull Knowledge of Mobile Application Security and MDM sensor data bull Expertise in Embedded Device Security bull Expertise in Malware Analysis bull Expertise in a variety of web application protocols, web services (components including JavaScript, XML, JSON), scripting capabilities (Powershell, Python, BASH) software development frameworks, operating systems, and networking technologies. Understanding of various web application frameworks such as ASP.NET , J2EE bull Organizational Skills Proven ability to plan and prioritize work, both their own and that of team. Follows tasks to their logical conclusion. o Problem Solving Natural inclination for planning strategy and tactics. Ability to analyze problems and determine root cause, generating alternatives, evaluating and selecting alternatives and implementing solutions. o Results oriented Able to drive things forward regardless of personal interest in the task.