Job Description
Title: Network Based Systems Analyst IV Description: Solutions³ LLC is supporting our prime contractor and their U.S. Government customer on a large mission critical development and sustainment program for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks. Solutions³ LLC provides advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities.
Solutions³ LLC is seeking a
Network Based Systems Analyst IV to support this critical mission by providing front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber activity.
Eligibility: - Must be a US Citizen
- Must have an active TS/SCI clearance
- Must be able to obtain DHS Suitability prior to starting employment
- 8+ years of directly relevant experience in network investigations
Responsibilities Include: - Assists the Government lead in coordinating teams in preliminary incident response investigations
- Assists the Government lead with interfacing with the customer while on site
- Determines appropriate courses of actions in response to identified and analyses anomalous network activity
- Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations
- Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies
- Collects network intrusion artifacts (e.g., PCAP, domains, URI’s, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents
- Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information
- Provide technical briefings as required
- Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements
Required Skills: - In depth knowledge of CND policies, procedures and regulations
- In depth knowledge of standard protocols – ICMP, DNS, SSH, SMTP, SMB, NFS, TCP/IP
- In depth knowledge and experience of Wifi networking
- In depth knowledge and experience of network topologies - DMZ’s, WAN’s, etc.
- Substantial knowledge of Splunk (or other SIEM’s)
- Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (ATT&CK)
- Knowledge of Computer Network Defense policies, procedures, and regulations
- Knowledge of defense-in-depth principles and general attack stages with respect to network security architecture
- Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources
- Ability to identify and analyze anomalies in network traffic using metadata
- Experience with reconstructing a malicious attack or activity based on network traffic
- Experience examining network topologies to understand data flows through the network
- Must be able to work collaboratively across physical locations
Desired Skills: - Substantial knowledge of network device integrity concepts and methodologies
- Proficiency with network analysis software (e.g. Wireshark)
- Proficiency with carving and extracting information from PCAP data
- Proficiency with non-traditional network traffic (e.g. Command and Control)
- Proficiency with preserving evidence integrity according to standard operating procedures or national standards
- Proficiency with virtualized environments
Desired Certifications: - DoD 8140.01 IAT Level II, IASAE II, CSSP Analyst, GCIA, GCIH, CSSP Analyst/CSSP Incident Responder, CEH
- SANS GIAC GNFA preferred
Required Education: BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma and
10+ years of network investigations experience
Job Tags
Full time, For contractors, Immediate start,