VetJobs - The Leading Military Job Board

Job Information

ARSIEM Cyber Network Defense Analyst (CNDA) 4 in Arlington, Virginia

About ARSIEM Corporation

At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support.

As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with.

ARSIEM is looking for a Cyber Network Defense Analyst 4 . This position is primarily a hybrid remote position with a 2-hour onsite reporting requirement and business travel as needed. Personnel will be required to live in the Continental US and are required to work core hours (Eastern Standard Time) to support one of our Government clients in Arlington, VA.

Responsibilities

  • Acquire/collect computer artifacts and logs supporting onsite and remote engagements.

  • Triage electronic devices and assess evidentiary value

  • Correlate forensic findings to network events in support of developing an intrusion narrative

  • Collect and document system state information (e.g., running processes, network connections) before imaging, as required

  • Perform forensic triage of an incident to include determining scope, urgency, and potential impact

  • Track and document forensic analysis from initial participation through resolution

  • Collect, process, preserve, analyze, and present computer-related evidence

  • Coordinate with Government staff and customer personnel to validate/investigate alerts or additional preliminary findings

  • Conduct analysis of forensic images and available evidence in support of forensic write-ups for inclusion in reports and written products

  • Support cloud development and automation projects to enhance threat emulation capabilities

  • Assist in documenting Computer Network Defense (CND) guidance and creating reports about incident findings

Minimum Qualifications

  • BS Computer Science, Cybersecurity, Computer Engineering, or related degree; HS Diploma & 4-6 years of host or digital forensics experience.

  • 10+ years of directly relevant experience in cyber forensic investigations using leading-edge technologies and industry-standard forensic tools

  • In-depth understanding of SaaS, PaaS, and IaaS in the Cloud Environment

  • Ability to create forensically sound duplicates of evidence (forensic images)

  • Ability to author cyber investigative reports documenting digital forensics findings

  • Proficiency in analysis and characterization of cyber attacks

  • Knowledge of cloud development and automation tools such as Terraform, Kubernetes, AWS CloudFormation, Azure Resource Manager, and Docker.

  • Skilled in identifying different classes of attacks and attack stages

  • Understanding of system and application security threats and vulnerabilities

  • Understanding of proactive analysis of systems and networks, including creating trust levels of critical resources

Preferred Qualifications

  • Knowledge of strategies/architectures involved in implementing M365/Azure authentication, how these relate to a federated identity solution, and a fundamental understanding of how threat actors would target identity to compromise an environment

  • Advanced experience and proficiency across various aspects of IT operations (e.g., networking, virtualization, identity, security, business continuity, disaster recovery, data management, and governance)

  • Experience and understanding in the acquisition, processing, and analysis of digital evidence from onsite enterprises and cloud-native platforms

  • Fundamental understanding of APIs and proficiency with PowerShell/PowerShell modules are leveraged to conduct API queries related to Azure/M365.

  • Proficiency with scripting languages (e.g., Bash, Python, PowerShell, JS) for automation of hunt tools used in commercial cloud environments

  • Ability to develop tools, architecture, and configurations in the Azure environment to support identifying threat actor activity.

  • Understanding of how Azure/M365 platform protection is implemented and security operations available

  • One or more certifications: GCLD, GCFR, GCFA, GCFE, GCIH, EnCE, CCE, CFCE, CISSP, CCSP, AWS certifications, Microsoft Azure associated certifications.

Clearance Requirement: This position requires an Active TS/SCI clearance and the ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability.

Candidate Referral: Do you know someone who would be GREAT at this role? If you do, ARSIEM has a way for you to earn a bonus through our referral program for persons presenting NEW (not in our resume database) candidates who are successfully placed on one of our projects. The bonus for this position is 5,000, and the referrer is eligible to receive the sum for any applicant we place within 12 months of referral. The bonus is paid after the referred employee reaches 6 months of employment.

ARSIEM is proud to be an Equal Opportunity and Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status, age, or any other federally protected class.

DirectEmployers