Base One Technologies
Create Threat Models to better understand the agency IT Enterprise, identify defensive gaps, and prioritize mitigations
Author, update, and maintain SOPs, playbooks, work instructions
Utilize Threat Intelligence and Threat Models to create threat hypotheses
Plan and scope Threat Hunt Missions to verify threat hypotheses
Proactively and iteratively search through systems and networks to detect advanced threats
Analyze host, network, and application logs in addition to malware and code
Prepare and report risk analysis and threat findings to appropriate stakeholders
Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation.
Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise
Basic Qualifications Positions at this career level typically require BS degree or equivalent and 2-4 years of prior relevant experience, or a master’s with less than 2 years, in order to operate within the scope contemplated by the level.
The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement
Experience in the areas of incident detection and response, malware analysis, or computer forensics.
Required Education/Experience BS degree or equivalent and 2-4 years of prior relevant experience, or a master’s with less than 2 years, in order to operate within the scope contemplated by the level.
Requirement Certifications (One or two of the following)
CCNA Security
CCNP Security
CEH – Certified Ethical Hacker
CHFI – Computer Hacking Forensic Investigator
CISSP – Certified Information Systems Security
CIRC
ECSA – EC-Council Certified Security Analyst
ECSS – EC-Council Certified Security Specialist
EnCE
ENSA – EC-Council Network Security Administrator
FIWE
GCFA – Forensic Analyst
GCFE – Forensic Examiner
GISF – Security Fundamentals
GNFA – Network Forensic Analyst
GXPN – Exploit Researcher and Advanced Penetration Tester
LPT – Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSWP (Wireless Professional)
WFE-E-CI
FTK-WFE-FTK
CompTIA Cyber Security Analyst (CySA+)
Splunk Core Certified Advanced Power User
Splunk Core Certified Consultant
Splunk SOAR Certified Automation Developer
IACRB Certified Security Awareness Practitioner (CSAP)
Preferred Qualifications
Expertise in network and host-based analysis and investigation
Demonstrated experience planning and executing threat hunt missions
Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
Familiar with operation of both Windows and Linux based systems
Proficient with scripting languages such as Python or PowerShell
Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
Demonstrated experience triaging and responding to APT activities.
Experience working with various technologies and platform such as AWS, Azure, O365, containers, etc.
Understanding of current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks.
#J-18808-Ljbffr
Author, update, and maintain SOPs, playbooks, work instructions
Utilize Threat Intelligence and Threat Models to create threat hypotheses
Plan and scope Threat Hunt Missions to verify threat hypotheses
Proactively and iteratively search through systems and networks to detect advanced threats
Analyze host, network, and application logs in addition to malware and code
Prepare and report risk analysis and threat findings to appropriate stakeholders
Create, recommend, and assist with development of new security content as the result of hunt missions to include signatures, alerts, workflows, and automation.
Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise
Basic Qualifications Positions at this career level typically require BS degree or equivalent and 2-4 years of prior relevant experience, or a master’s with less than 2 years, in order to operate within the scope contemplated by the level.
The candidate must currently possess a Top Secret Clearance. In addition to clearance requirement
Experience in the areas of incident detection and response, malware analysis, or computer forensics.
Required Education/Experience BS degree or equivalent and 2-4 years of prior relevant experience, or a master’s with less than 2 years, in order to operate within the scope contemplated by the level.
Requirement Certifications (One or two of the following)
CCNA Security
CCNP Security
CEH – Certified Ethical Hacker
CHFI – Computer Hacking Forensic Investigator
CISSP – Certified Information Systems Security
CIRC
ECSA – EC-Council Certified Security Analyst
ECSS – EC-Council Certified Security Specialist
EnCE
ENSA – EC-Council Network Security Administrator
FIWE
GCFA – Forensic Analyst
GCFE – Forensic Examiner
GISF – Security Fundamentals
GNFA – Network Forensic Analyst
GXPN – Exploit Researcher and Advanced Penetration Tester
LPT – Licensed Penetration Tester
OSCE (Certified Expert)
OSCP (Certified Professional)
OSWP (Wireless Professional)
WFE-E-CI
FTK-WFE-FTK
CompTIA Cyber Security Analyst (CySA+)
Splunk Core Certified Advanced Power User
Splunk Core Certified Consultant
Splunk SOAR Certified Automation Developer
IACRB Certified Security Awareness Practitioner (CSAP)
Preferred Qualifications
Expertise in network and host-based analysis and investigation
Demonstrated experience planning and executing threat hunt missions
Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers
Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
Familiar with operation of both Windows and Linux based systems
Proficient with scripting languages such as Python or PowerShell
Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
Demonstrated experience triaging and responding to APT activities.
Experience working with various technologies and platform such as AWS, Azure, O365, containers, etc.
Understanding of current cyber threat landscape, the different tactics commonly used by adversaries and how you would investigate, contain and recover against their attacks.
#J-18808-Ljbffr