Lumen Technologies
Senior Lead Information Security Engineer - Black Lotus Labs
Lumen Technologies, Baltimore, Maryland, United States
Threat Research Analyst - Black Lotus Labs
Join to apply for the
Threat Research Analyst - Black Lotus Labs
role at
Lumen Technologies About Lumen Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
The Role Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen’s unique visibility to hunt and scale discovery of evolving malicious threats as well as provide guidance on mitigations on large networks. Our global visibility into one of the world’s largest and most interconnected IP backbones as well as our computing cluster present exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years. This position will work alongside Black Lotus Labs advanced security researchers, data engineers, malware reverse engineers, data scientists, and our customers to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots.
This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening with requirements for in person collaboration at the customer site as needed in Annapolis Junction, Maryland. This position requires an active TS/SCI security clearance w/ CI Poly. Location This is a remote position open to candidates based in Maryland or Virginia. The Main Responsibilities
Research latest threat attacker tools, techniques, and procedures (TTPs) with a goal of automating detection. Work with cyber operators, when requested, to conduct in-depth investigations on cyber threat activity and provide mitigation guidance. Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana. Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups. Support customer RFIs on incidents and emerging threats. What We Look For In a Candidate Desired candidates will have a strong background exhibiting:
Candidates must effectively communicate complex domain-specific concepts, ensuring clarity for both technical and non-technical audiences. Familiarity with adversary capabilities, infrastructure, and techniques that can be applied in collaboration with supporting teams and partners to discover, track, and defend against the adversaries aggression towards customer networks. Experience using OSINT methods for investigation, including discovering novel threats in malware repositories. Scripting experience with Python and familiarity with distributed computing. Extensive experience hunting threat actors and developing algorithms and techniques to identify new threats from large data sets. Deep knowledge of network-based threats and identifying behaviors without attack payloads. Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages. User-level experience in a Unix-based environment. Familiarity with extracting data through SQL. Strong writing skills to assist in sharing our knowledge with the public. Demonstrable knowledge of several of the following areas: cybersecurity concepts, network protocols, firewalls, IDS/IPS systems, cyber threat hunting, malware analysis tools and techniques, cyber threat intelligence, common threat actor TTPs, application security concepts, cloud security fundamentals. Well Experienced Candidates May Also Have The Following Skills
Previous work experience with Department of Defense (DoD), Intelligence Community, or other government agencies (e.g., DHS, DOE, VA, etc.) Experience with Spark and distributed computing. Experience developing automation and analysis in Python-based environments. Ability to work with others in providing direction and assisting in learning new topics. Preferred
Proficient in analyzing NetFlow data to identify unusual patterns and potential security threats. Interest in conducting trend analysis to uncover patterns and emerging threats, enabling proactive defense strategies. Compensation This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges $129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. Equal Employment Opportunities We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
#J-18808-Ljbffr
Join to apply for the
Threat Research Analyst - Black Lotus Labs
role at
Lumen Technologies About Lumen Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re looking for top-tier talent and offer the flexibility you need to thrive and deliver lasting impact. Join us as we digitally connect the world and shape the future.
The Role Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen’s unique visibility to hunt and scale discovery of evolving malicious threats as well as provide guidance on mitigations on large networks. Our global visibility into one of the world’s largest and most interconnected IP backbones as well as our computing cluster present exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years. This position will work alongside Black Lotus Labs advanced security researchers, data engineers, malware reverse engineers, data scientists, and our customers to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots.
This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening with requirements for in person collaboration at the customer site as needed in Annapolis Junction, Maryland. This position requires an active TS/SCI security clearance w/ CI Poly. Location This is a remote position open to candidates based in Maryland or Virginia. The Main Responsibilities
Research latest threat attacker tools, techniques, and procedures (TTPs) with a goal of automating detection. Work with cyber operators, when requested, to conduct in-depth investigations on cyber threat activity and provide mitigation guidance. Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana. Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups. Support customer RFIs on incidents and emerging threats. What We Look For In a Candidate Desired candidates will have a strong background exhibiting:
Candidates must effectively communicate complex domain-specific concepts, ensuring clarity for both technical and non-technical audiences. Familiarity with adversary capabilities, infrastructure, and techniques that can be applied in collaboration with supporting teams and partners to discover, track, and defend against the adversaries aggression towards customer networks. Experience using OSINT methods for investigation, including discovering novel threats in malware repositories. Scripting experience with Python and familiarity with distributed computing. Extensive experience hunting threat actors and developing algorithms and techniques to identify new threats from large data sets. Deep knowledge of network-based threats and identifying behaviors without attack payloads. Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages. User-level experience in a Unix-based environment. Familiarity with extracting data through SQL. Strong writing skills to assist in sharing our knowledge with the public. Demonstrable knowledge of several of the following areas: cybersecurity concepts, network protocols, firewalls, IDS/IPS systems, cyber threat hunting, malware analysis tools and techniques, cyber threat intelligence, common threat actor TTPs, application security concepts, cloud security fundamentals. Well Experienced Candidates May Also Have The Following Skills
Previous work experience with Department of Defense (DoD), Intelligence Community, or other government agencies (e.g., DHS, DOE, VA, etc.) Experience with Spark and distributed computing. Experience developing automation and analysis in Python-based environments. Ability to work with others in providing direction and assisting in learning new topics. Preferred
Proficient in analyzing NetFlow data to identify unusual patterns and potential security threats. Interest in conducting trend analysis to uncover patterns and emerging threats, enabling proactive defense strategies. Compensation This information reflects the anticipated base salary range for this position based on current national data. Minimums and maximums may vary based on location. Individual pay is based on skills, experience and other relevant factors. Location Based Pay Ranges $129,639 - $172,852 in these states: AL, AR, AZ, FL, GA, IA, ID, IN, KS, KY, LA, ME, MO, MS, MT, ND, NE, NM, OH, OK, PA, SC, SD, TN, UT, VT, WI, WV, and WY. $136,121 - $181,494 in these states: CO, HI, MI, MN, NC, NH, NV, OR, and RI. $142,603 - $190,137 in these states: AK, CA, CT, DC, DE, IL, MA, MD, NJ, NY, TX, VA, and WA. Equal Employment Opportunities We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
#J-18808-Ljbffr