Top Secret Computer SCI Network Defense Analyst/CND Engineer

Location: Quantico, Virginia
Date Posted: 07-06-2017
Clearance TS/SCI – no poly needed
 Description:



The CND Analyst shall identify, collect, and analyze network and host data, and report events or incidents that occur or might occur within a network to mitigate immediate and potential network and host threats.

The individual shall perform computer network defense (CND) incident triage, to include determining urgency, and potential impact; identifying the specific vulnerability; and making recommendations that enable expeditious remediation, and making recommendations that enable expeditious remediation, perform initial, forensically sound collection of images and inspect to determine mitigation/remediation on enterprise systems; perform real-time computer network defense (CND) incident handling (e. g., forensic collection, intrusion correlation/tracking, threat analysis, and direct system remediation) task to support Incident Response Teams, receive and analyze network alerts from various sources within the enterprise and determine possible causes of such alerts, and track and document computer network defense (CND) incidents from initial detection through final resolution. The candidate should be able to employ defense-in-depth principles and practices, collect intrusion artifacts (e.g., source code, malware, and Trojans) and use discovered data to enable mitigation of potential computer network defense (CND) incidents within the enterprise.

The candidate must be able to provide expert technical support to enterprise-wide CND technicians to document CND incidents, correlate incident data to identify specific vulnerabilities and to make recommendations enabling remediation. Must have experience monitoring external data sources (e.g., computer network defense vendor sites, Computer Emergence Response Teams, SANS, Security Focus), update the CND threat condition, and determine which security issues may have an impact on the enterprise. Must have experience analyzing log files, firewalls, firewall logs, and intrusion detection systems and IDS Logs to identify possible threats to network security, and to perform command and control functions in response to incidents
 
Assist with analysis of actions taken by malicious actors to determine initial infection vectors, establish a timeline of activity and any data loss associated with incidents. Must be experienced in the use of various incident response tools (e.g., Acunetix, Adobe, Cobalt Strike, FireEye, Fluke Networks Air Magnet, F-Response, Encase Guidance Software, IDA Pro, McAfee Advance Threat Defense, Network Miner Pro, Palo Alto, Burp Suite Professional, Metasploit Rapid 7, Red Seal, Splunk, VMWare, Domain Tools, Virus Tools, Microsoft Products, Operating Systems (e.g., Windows OS 2008 and 2012; Linux).


Qualifications:
Required Qualifications:

- 10 years of recent work experience in incident response
- Bachelor Degree in Computer Science
- Must have an IAM Level III certification (GSLC, CISM, or CISSP) or the ability to obtain within 6 months of employment.
- Experience performing computer network defense (CND) incident triage
- Experience forensically interrogating and analyzing Microsoft Windows Operating Systems (Windows 7/10/2008R2/2012R2)
- Experience performing computer programming tasks with Microsoft PowerShell programming from a Digital Forensic/Incident Response perspective.
- Experience performing computer programming tasks with Pyton Programming
 
or
this job portal is powered by CATS