Network Forensic Analyst III - Arlington, United States - Ampcus Incorporated

    Default job background
    Description
    Network Forensic Analyst

    Multi Year Salaried Contract

    2-3 Weeks of Training in Arlington, VA

    Consultants living within 50 miles of Arlington, VA will need to be onsite 1 time per week

    Hybrid (2-3) days onsite for consultants living closer than 50 miles to Arlington, VA

    The Clients Hunt and Incident Response Team (HIRT) secures the nations infrastructure. HIRT provides Clients front-line response for cyber incidents and proactive hunting for malicious cyber activity.

    The Client . provides support for on and offsite incident response to Government agencies and critical infrastructure owners who experience cyber-attacks.

    The Client provides HIRT advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities.

    Personnel perform investigations to characterize the level of severity of breaches and develop mitigation/remediation plans.


    Responsibilities:
    Assists the Government lead in coordinating teams in preliminary incident response investigations

    Assists the Government lead with interfacing with the customer while on site

    Determines appropriate courses of actions in response to identified and analyses anomalous network activity

    Assesses network topology and device configurations identifying critical security concerns and providing security best practice recommendations

    Assists with the writing and publishing of Computer Network Defense guidance and reports on incident findings to appropriate constituencies

    Collects network intrusion artifacts (e.g., PCAP, domains, URIs, certificates, etc.) and uses discovered data to enable mitigation of potential Computer Network Defense incidents

    Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, effects on system and information

    Collects network device integrity data and analyze for signs of tampering or compromise

    Assists with real-time CND incident handling (i.e., forensic collections, intrusion correlation and tracking, threat analysis, and advising on system remediation) tasks to support onsite engagements

    Assist with developing analytic solutions for mapping network traffic back to Threat TTPs

    Provide input to the Government lead in developing processes, standards, WIs, or SOPs


    Required Skills:
    U.S. Citizenship

    Must have an active TS/SCI clearance

    Must be able to obtain Client Suitability

    5+ years of directly relevant experience in network investigations

    In depth knowledge of CND policies, procedures and regulations

    In depth knowledge of TCP/IP protocols

    In depth knowledge of standard protocols

    ICMP, HTTP/S, DNS, SSH, SMTP, SMB, NFS, etc.

    In depth knowledge and experience of Wifi networking

    In depth knowledge and experience of network topologies - DMZs, WANs, etc.

    Substantial knowledge of Splunk (or other SIEMs)

    Understanding of MITRE Adversary Tactics, Techniques and Common Knowledge (Telecommunication&CK)

    Ability to characterize and analyze network traffic to identify anomalous activity and potential threats to network resources

    Ability to identify and analyze anomalies in network traffic using metadata

    Experience with reconstructing a malicious attack or activity based on network traffic

    Experience examining network topologies to understand data flows through the network

    Must be able to travel domestically on short notice

    Must be able to work collaboratively across physical locations


    Desired Skills:
    Substantial knowledge of network device integrity concepts and methodologies

    Proficiency with network analysis software (e.g. Wireshark)

    Proficiency with carving and extracting information from PCAP data

    Proficiency with non-traditional network traffic (e.g. Command and Control)

    Knowledge of ICS/OT protocols

    Substantial knowledge of Arkime

    Experience with network sensors (e.g., Corelight, Cisco FMC, Suricata)


    Required Education:


    BS Computer Science, Cyber Security, Computer Engineering, or related degree; or HS Diploma & 7-9 years of network investigations experience.


    Desired Certifications:

    • DoD IAT Level II, IASAE II, CSSP Analyst, GCIA, GCIH, CSSP Analyst/CSSP Incident Responder
    Please send your resume to

    #J-18808-Ljbffr