Browse
Employers / Recruiters

Cyber Network Defense Analyst (CNDA) 4

arsiem · 30+ days ago
Arlington, VA
Negotiable
Full-time
Continue
By pressing the button above, you agree to our Terms and Privacy Policy, and agree to receive email job alerts. You can unsubscribe anytime.
About ARSIEM Corporation

At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients.  We provide support to multiple agencies across the United States Government.  ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.

As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients.  That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. 

ARSIEM is looking for a Cyber Network Defense Analyst 4. This position will support one of our Government clients in Arlington, VA.

Responsibilities

  • Acquire/collect computer artifacts and logs in support of onsite and remote engagements
  • Triage electronic devices and assess evidentiary value
  • Correlate forensic findings to network events in support of developing an intrusion narrative
  • Collect and document system state information (e.g., running processes, network connections) prior to imaging, as required
  • Perform forensic triage of an incident to include determining scope, urgency, and potential impact
  • Track and document forensic analysis from initial participation through resolution
  • Collect, process, preserve, analyze, and present computer-related evidence
  • Coordinate with Government staff and customer personnel to validate/investigate alerts or additional preliminary findings
  • Conduct analysis of forensic images and available evidence in support of forensic write-ups for inclusion in reports and written products
  • Support cloud development and automation projects to enhance threat emulation capabilities
  • Assist to document Computer Network Defense (CND) guidance and create reports pertaining to incident findings

Minimum Qualifications

  • BS Computer Science, Cybersecurity, Computer Engineering, or related degree; or HS Diploma & 4-6 years of host or digital forensics experience.
  • 10+ years of directly relevant experience in cyber forensic investigations using leading-edge technologies and industry-standard forensic tools
  • In-depth understanding of SaaS, PaaS, and IaaS in the Cloud Environment
  • Ability to create forensically sound duplicates of evidence (forensic images)
  • Ability to author cyber investigative reports documenting digital forensics findings
  • Proficiency in analysis and characterization of cyber attacks
  • Knowledge of cloud development and automation tools such as Terraform, Kubernetes, AWS CloudFormation, Azure Resource Manager, and Docker.
  • Skilled in identifying different classes of attacks and attack stages
  • Understanding of system and application security threats and vulnerabilities
  • Understanding of proactive analysis of systems and networks, including creating trust levels of critical resources

Preferred Qualifications

  • Knowledge of strategies/architectures involved in implementing M365/Azure authentication, how these relate to a federated identity solution and a fundamental understanding of how threat actors would target identity to compromise an environment
  • Advanced experience and proficiency across various aspects of IT operations (e.g., networking, virtualization, identity, security, business continuity, disaster recovery, data management, and governance)
  • Experience and understanding in acquisition, processing, and analysis of digital evidence from onsite enterprises and cloud-native platforms
  • Fundamental understanding of APIs and proficiency with PowerShell/PowerShell modules leveraged to conduct API queries as they relate to Azure/M365
  • Proficiency with scripting languages (e.g., Bash, Python, PowerShell, JS) for automation of hunt tools used in commercial cloud environments
  • Ability to develop tools, architecture and configurations in Azure environment to support identifying threat actor activity.
  • Understanding of how Azure/M365 platform protection is implemented and security operations available
  • One or more of the following certifications: GCLD, GCFR, GCFA, GCFE, GCIH, EnCE, CCE, CFCE, CISSP, CCSP, AWS certifications, Microsoft Azure associated certifications.
Clearance Requirement: This position requires an Active TS/SCI clearance and the ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability.
 
Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is 5,000,  and the referrer is eligible to receive the sum for any applicant we place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment.

ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

Last updated on Sep 12, 2024

See more

About the company

More jobs at arsiem

Analyzing

Annapolis Junction, Maryland

 · 

30+ days ago

Annapolis Junction, Maryland

 · 

30+ days ago

Annapolis Junction, Maryland

 · 

30+ days ago

Annapolis Junction, Maryland

 · 

30+ days ago

Annapolis Junction, Maryland

 · 

30+ days ago

More jobs like this

Analyzing
ELECT - IT Security Analyst 2
B
b6jdnwcpcemgg8el3r9winlpunj8hc038b1vkhowrzxn9gitznreodi38t7rirkp

Richmond, Virginia

 · 

30+ days ago

Information Security Officer
9
9xjdnwf8nt489qdiu4ab0qq7clsnet01f27n6pjaxju02yq1u697ou3dvfougsq9

Santa Clara, California

 · 

30+ days ago

Security Engineer
0
01jdnwg028j5z7sqr5v2kknizydum00361uo9lv9r7k3dur17h5v7wx2rj64vu35

Frisco, Texas

 · 

30+ days ago

Security Analyst
Q
qualis-corporation

Huntsville, Alabama

 · 

30+ days ago

KNG OF PRUSSA, Pennsylvania

 · 

30+ days ago

Fredericksburg, Virginia

 · 

30+ days ago

Burlington, Massachusetts

 · 

30+ days ago

Security Engineer | Fully remote
T
two95-international-inc-3

Remote

 · 

30+ days ago

Marinette, Wisconsin

 · 

30+ days ago

Developed by Blake and Linh in the US and Vietnam.
We're interested in hearing what you like and don't like! Live chat with our founder or join our Discord
Changelog
🚀 LaunchpadNov 27
Create a site and sell services based on your resume.
🔥 Job search dashboardNov 13
Revamped job search UI with a sortable grid, live filtering, bookmarks, and application tracking.
🫡 Cover letter instructionsSep 27
New Studio settings give you control over AI output.
✨ Cover Letter StudioAug 9
Automatically generate cover letters for any job.
🎯 Suggested filtersAug 6
Copilot suggests additional filters above the results.
⚡️ Quick applicationsAug 2
Apply to jobs using info from your resume. Initial coverage of ~200k jobs in Spain, Germany, Austria, Switzerland, France, and the Netherlands.
🧠 Job AnalysisJul 12
Have Copilot read job descriptions and extract out key info you want to know. Click "Analyze All" to try it out. Click on the Copilot's gear icon to customize the prompt.
© 2024 RemoteAmbitionAffiliate · Privacy · Terms · Sitemap · Status