• Network Threat Specialist, Sr.

    Location US-MD-Ft. Meade
    Posted Date 2 weeks ago(11/2/2018 11:21 AM)
    Job ID
    N-1918
    # Positions
    1
    Experience (Years)
    8
    Category
    Cyber Security
  • Overview

    WOOD is currently hiring a Sr. Level Network Threat Specialist to join our team in the Ft. Meade, MD area. The Network Threat Specialist will analyze, map, protect and discover vulnerabilities, intrusions and threats in a computer network systems. 

     

    Responsibilities

    • Designing, demonstrating, developing, implementing, and updating exploitation or protection methods and recommending mitigation strategies and techniques
    • The Cyber/SIGINT Analyst able to conduct discovery efforts of unattributed malicious activity and develop target to a sustainable community for follow-on deep dive development
    • Evaluating multiple operating systems, network configurations, network architectures and topologies for potential technical and/or operational vulnerabilities. Efforts also include:
      • Analyzing network transports and application layer packets and identifying packet details
      • Identifying anomalies at the packet level and developing signatures to support various collection platforms
      • Demonstrating proficiency with common network protocols and analysis tools, specifically Wireshark (Ethereal)
    • Performing each phase of cyber activity tracking; conducting network reconnaissance to detect the presence of unexpected behavior, identifying anomalous activity, categorizing and tagging intrusive activity
    • Performing network intrusion incident response and network attack characterization and reconstruction
    • Identifying signatures, attack scenarios, attacker profiles, and other relevant information to enhance Customer's knowledge of the adversary and the techniques employed
    • Performing in-depth technical analysis with the goal of determining what the intruder did or attempted to do, where they came from, how they got in, their motivation, and anything else that can be learned from analyzing the intrusion data to include:
      • Developing techniques for the identification and analysis of malicious activity
      • Understanding the development of SNORT signatures or similar intrusion detection syntax
      • Determining the extent of malware's capabilities, how to detect it and to assess its impact on affected systems
    • Conducting real world, near real time, monitoring, analysis and reporting.
    • Utilizing tools (in-house, freeware, commercial) and analytical techniques to determine the levels of severity and potential mission impact of anomalous behavior.
    • Writing scripts/tools to develop an analysis capability to include:
      • Applying basic analytic methods such as computer programming, (JAVA, Perl, C, etc.) and debugging programs
      • Developing technical techniques and processes
    • Reviewing log files, Access Control List (ACL), network Intrusion Detection System (IDS) records and host IDS records for evidence of pre-intrusion activity

    Qualifications

    *All Candidates must have a TS/SCI clearance with a Polygraph

    • Shall have a minimum of eight (8) continuous years of work experience in network and vulnerability analysis, or a combination of a minimum of five (5) continuous years of work experience in network and vulnerability analysis and a Bachelor’s degree in an applicable (math, science, computers, engineering) field
    • Work experience shall include five (5) years of IC experience in network and vulnerability analysis
    • Must demonstrate in-depth technical malware knowledge to provide analytic support
    • Must be able to develop courses of action to identify requirements to mitigate network threats and attacks
    • Develop high-confidence rule sets to detect and discover network threats
    • Must be able to provide on-the-job-training and briefings to division members regarding newly acquired and/or established analytical tools, techniques, and methodologies, analytic processes, and network characterizations used
    • Shall have demonstrated expertise related to the use of relevant Computer Network Operations (CNO) and SIGINT tools and databases used for the customer mission
    • Shall also demonstrate analytic ability to discover unknown, suspicious or exploitation activity, be able to provide briefings of intrusion set activity to partner organizations/agencies, and be knowledgeable about all forms of reporting and experienced with creating each product type, and thus be able to organize training for other team members on analysis, tools, or reporting
    • Shall have demonstrated the analytic expertise to perform technical analysis for exploitation of an identified activity that is of an unknown or suspicious origin, competence with relevant analyst tools and databases used by the customer organization, and communications skills that include the ability to provide formal documentation of analysis and/or research results
    • Shall be considered a Subject Matter Expert (SME) in one or more fields appropriate to Intelligence Analysis or Computer Networking technologies, and be to serve as a Subject Matter Expert for working groups and meetings with partner organizations/agencies
    • Shall have demonstrated expertise in analyzing intelligence information and technical data, analyzing exploitation opportunities, interpreting analytical results, writing and editing skills at a technical/professional level, and manageing internal and external customer relations

    Required Tools/Certifications: Wireshark/Ethereal, Nessus, Snort, tcpdump, tcp wrapper, IDS (various), ISS scanner, eEye digital vulnerability scanner, <forensics work at host, network, or software levels>, <penetration testing work>, <malware, spyware, botnet work>, GCFIH, CNDA, Forensic examiner, Media Collector, Security+,  Nmap, SSCP, Cisco CCNA ( and other Cisco related network certs),  Network+, Net Impact

     

    Preferred Tools/CertificationsIDA Pro, MetaSploit, EnCase, Cain and Abel, John the Ripper, Ollydebug, HBSS, GSEC, GCIA, GPEN, GCFW, GCFA, CORE Impact, certified basic digital media collector, Paraben

     

     

    WOOD Consulting Services is headquartered in Fulton, Maryland with an office in Washington, DC. WOOD embraces a simple philosophy… take care of our people and they will take care of our customers. We seek to hire and retain high caliber-talent to meet the needs of our customers with excellent services. For over 20 years, WOOD has followed that philosophy and built a reputation as reliable mission-enablers helping U.S. agencies achieve mission success.

     

    WOOD is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.

     

    Options

    Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
    Share on your newsfeed