Cyber Security Threat Analyst

at  Culmen International LLC

Arlington, Virginia, USA -

Start DateExpiry DateSalaryPosted OnExperienceSkillsTelecommuteSponsor Visa
Immediate20 Nov, 2024Not Specified22 Aug, 20245 year(s) or aboveTechnical Training,Red Hat Enterprise Linux,Console,Add Ons,ServicenowNoNo
Add to Wishlist Apply All Jobs
Required Visa Status:
CitizenGC
US CitizenStudent Visa
H1BCPT
OPTH4 Spouse of H1B
GC Green Card
Employment Type:
Full TimePart Time
PermanentIndependent - 1099
Contract – W2C2H Independent
C2H W2Contract – Corp 2 Corp
Contract to Hire – Corp 2 Corp

Description:

Overview:
Established in 2004, Culmen International is committed to enhancing international security, strengthening homeland defense, optimizing government operations and providing humanitarian assistance around the world. We provide technical and management expertise, develop innovative technology solutions, and deliver youth care services, logistics, training and language services worldwide. With experience in over 140 countries, Culmen supports our clients to accomplish critical missions in challenging environments.
Culmen International is seeking a Cyber Security Analyst to work for the Department of State Refugee Processing Center (RPC) on site in Arlington, VA.
The Refugee Processing Center (RPC) is part of the U.S. Department of State’s humanitarian bureau. Located in Rosslyn, Virginia, RPC staff design IT systems, ensure operations run smoothly, analyze data, and improve processing methods. The team includes various professionals like case workers, data scientists, engineers, cybersecurity experts, software developers, and more.
In this role, you’ll research cyber threats to systems and programs, analyze cybercriminals’ capabilities and attack methods, and proactively hunt for malicious activities using tools like SPLUNK and Tanium. You’ll also help remediate threats and provide incident response. Collaboration with Cloud and Splunk experts is key, and you’ll support them in enhancing security tools. Additionally, you’ll develop new threat-hunting processes to improve the security team’s ability to detect hidden threats.
This role will also include developing and documenting new and innovative threat-hunting processes to increase the security operation center team’s ability to find existing threats that are otherwise going unidentified or unnoticed.

Roles & Responsibilities:

  • Solid knowledge of building and designing queries, reports, and dashboards in SPLUNK Enterprise in order to extract log information from various sources and conduct threat hunting and incident response.
  • Support Cyber Security Operations Team with Engineering Tasks including implementation, upgrade, update and maturing new Security Tool Sets.
  • Experience in Tanium Modules (Asset, Threat Response, Comply, Protect) to conduct Incident response and threat hunting.
  • Experienced in creating and fine-tuning notables, alerts, and dashboards in SPLUNK
  • Utilize EDR, IDS, and other security tools to conduct cyber threat hunts and incident response.
  • Rapidly respond, escalate, and remediate incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments.
  • Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis.
  • Seek opportunities to automate detection and remediation and reduce response times for incidents.
  • Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
  • Producing reports, metrics, and briefings that include perspectives on the behavior of adversaries.
  • Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies.
  • Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats.
  • Evaluate third-party products and services to verify they meet security and compliance requirements.
  • Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices.
  • Develops technical solutions to autonomously verify compliance with required technical controls.
  • Present findings/reports to stakeholders every week
  • Experience with more than one or more enterprise-scale EDR and SIEM tool
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.

Basic Qualifications:

  • Active Secret clearance
  • MA/MS with, 5-7 years of relevant experience
  • OR Bachelors with 9-10 years of relevant experience
  • OR combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experiences.
  • Experience in a cloud environment (console, IAM, security groups, etc.)
  • Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources
  • Knowledge of a tier Splunk installation; indexers, forwarders, search heads, clusters
  • Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain or MITRE ATTACK Framework
  • Familiarity with ServiceNow cloud offering
  • Familiarity with Red Hat Enterprise Linux and Ansible

Top Tier Benefits Package:

  • Exceptional Medical/Dental/Vision coverage with 100% of the premiums paid by the company for all employees and their eligible dependents
  • 401k – Vested immediately and 4% match
  • Life insurance and disability paid by the company
  • AFLAC Available
  • Tuition Assistance
  • 12 Paid Holidays

At Culmen International we are committed to creating, promoting, and sustaining a culture of diversity, equity, and inclusion. Our commitment to these values is unwavering across all our work around the world. We include and celebrate employees of diverse races, genders, religions, sexual orientations, ethnicities, nationalities, socioeconomic statuses, languages, (dis)abilities, ages, and religious commitments. These differences drive innovative solutions to meet the needs of our employees and clients. Culmen is an equal opportunity employer.

Responsibilities:

  • Solid knowledge of building and designing queries, reports, and dashboards in SPLUNK Enterprise in order to extract log information from various sources and conduct threat hunting and incident response.
  • Support Cyber Security Operations Team with Engineering Tasks including implementation, upgrade, update and maturing new Security Tool Sets.
  • Experience in Tanium Modules (Asset, Threat Response, Comply, Protect) to conduct Incident response and threat hunting.
  • Experienced in creating and fine-tuning notables, alerts, and dashboards in SPLUNK
  • Utilize EDR, IDS, and other security tools to conduct cyber threat hunts and incident response.
  • Rapidly respond, escalate, and remediate incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments.
  • Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis.
  • Seek opportunities to automate detection and remediation and reduce response times for incidents.
  • Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident.
  • Producing reports, metrics, and briefings that include perspectives on the behavior of adversaries.
  • Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies.
  • Manage and support the development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats.
  • Evaluate third-party products and services to verify they meet security and compliance requirements.
  • Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices.
  • Develops technical solutions to autonomously verify compliance with required technical controls.
  • Present findings/reports to stakeholders every week
  • Experience with more than one or more enterprise-scale EDR and SIEM tool
  • Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways


REQUIREMENT SUMMARY

Min:5.0Max:10.0 year(s)

Information Technology/IT

IT Software - Network Administration / Security

Other

Graduate

Proficient

1

Arlington, VA, USA