At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #: 578
Job Title: Cyber Security Engineer
Location: 22001 Loudoun County Pkwy Ashburn, Virginia 20147
Clearance Level: Background Check
SUMMARY
The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise-wide information systems, and collects, investigates, and reports any suspected and confirmed security violations. We are seeking an experienced Cyber Countermeasures Engineer to join our team. As a member of this highly technical team supporting our client. You will play a crucial role in defending against cyber threats and will perform in-depth technical analysis of network and endpoint logs & activity, direct and track enterprise countermeasure actions, implement countermeasures across a broad spectrum of network and host based tools, and assess/validate the efficacy of countermeasure deployment in support of the protection of the customers’ systems, networks, and assets.
JOB DUTIES AND RESPONSIBILITIES
· Directing, tracking, and implementing enterprise wide countermeasures across a wide spectrum of endpoint, network, and cloud based tools.
· Assessing, validating, and ensuring deployment and continuous efficacy of deployed countermeasures in the environment.
· Create, recommend, and assist with development of new security content as the result of coordination with other teams, to include signatures, alerts, workflows, and automation.
· Develop new processes, procedures, and playbooks for countermeasure implementation as new technologies are deployed in the environment.
· Understand intrusion sets, TTPs, and threat actors to better tailor countermeasure deployement across the enterprise.
· Responsible for maintaining a comprehensive understanding of the cyber threat landscape, including identifying and analyzing new tools and processes for countermeasure deployment to enhance cybersecurity posture of the organization’s IT operating environment.
· Coordinate with various other teams and stakholders to maintain their situational awareness of countermeasure deployment.
· Collect and report metrics surrounding countermeasure deployment on a weekly, monthly, and annual basis.
· Assess, analyze, and effectively communicate risks associated with various types of countermeasures and their deployment in the environment.
· Coordinate with different teams to improve threat detection, response, and improve overall security posture of the Enterprise.
· Proactively and iteratively search through systems and networks to detect advanced threats and escalate as necessary, or recommend countermeasures for impelmentation.
· Analyze host, network, and application logs in addition to malware and code.
· Will be responsible for developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other type most appropriate for the task.
· Produce high quality technical and non-technical reports with minimal supervision and emphasis on effective/accurate reporting.
· Will be responsible for:
· Implementing countermeasure recommendations from various teams across a wide array of EDR, DLP, mobile, and network based tools.
· Maintain leadership situational awareness of current countermeasures, metrics, and capabilities/risks of various countermeasures.
· Develop new processes, procedures, and playbooks surrounding the implementation of new techologies as they are deployed in the environment and the capabilities/limitations of the tools.
· Create daily, weekly, and monthly reports and metrics for products and briefings.
· Process technical data from various sources and recommend countermeasures for implementation on various tools.
· Responsible for the maintaining and actioning the full lifecycle of countermeasures across a broad array of endpoint, network, and cloud based technologies/tools.
QUALIFICATIONS
Required Certifications
· The candidate should have at minimum ONE of the following certifications:
· • CompTIA Cyber Security Analyst (CySA+)
· • CompTIA Linux Network Professional (CLNP)
· • CompTIA Pentest+
· • CompTIA Cybersecurity Analyst (CySA+)
· • GPEN – Penetration Tester
· • GWAPT – Web Application Penetration Tester
· • GSNA – System and Network Auditor
· • GISF – Security Fundamentals
· • GXPN – Exploit Researcher and Advanced Penetration Tester
· • GWEB – Web Application Defender
· • GNFA – Network Forensic Analyst
· • GMON – Continuous Monitoring Certification
· • GCTI – Cyber Threat Intelligence
· • GOSI – Open Source Intelligence
· • OSCP (Certified Professional)
· • OSCE (Certified Expert)
· • OSWP (Wireless Professional)
· • OSEE (Exploitation Expert)
· • CCFP – Certified Cyber Forensics Professional
· • CISSP – Certified Information Systems Security
· • CEH – Certified Ethical Hacker
· • CHFI – Computer Hacking Forensic Investigator
· • LPT – Licensed Penetration Tester
· • CSA – EC Council Certified SOC Analyst (Previously ECSA – EC-Council Certified Security Analyst)
· • ENSA – EC-Council Network Security Administrator
· • ECIH – EC-Council Certified Incident Handler
· • ECSS – EC-Council Certified Security Specialist
· • ECES – EC-Council Certified Encryption Specialist
Education, Background, and Years of Experience
· Have a bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field with three (3) years of experience in incident detection and response, malware analysis, or cyber forensics.
ADDITIONAL SKILLS & QUALIFICATIONS
Required Skills
· Must be a US citizen, no clearance required and in addition, must have a current or be able to favorably pass a (BI) Background Investigation to join this program.
· Possess a minimum of five (4) years of professional experience in incident detection and response, malware analysis, or cyber forensics.
· Experience with various host, network, cloud, email, and mobile based technologies and tools related to detections and countermeasures.
· Have 2+ years recent experience with host-based and network-based security monitoring using cybersecurity capabilities.
· Must be experienced developing scripts to support cyber threat detection that outputs results in a variety of formats, such as VB scripts, Python, C++, HTML, XML or other.
· Established experience with incident response and SIEM tools, host-based logs, network-based logs, and regex.
· Ability to work independently with minimal direction; self-starter/self-motivated.
Preferred Skills
· A minimum of five (5) years of hands-on experience with experience in the last two (2) years that includes host-based and network-based security monitoring using cybersecurity capabilities.
· Previous DOD, IC or Law Enforcement Intelligence or Counterintelligence Training/Experience
· Demonstrated experience implementing countermeasures across a broad array of endpoint, network, and cloud based technologies/tools.
· Understanding of complex Enterprise networks to include routing, switching, firewalls, proxies, load balancers, and tools such as EDR, DLP, and Mobile Threat Detection.
· Working knowledge of common (HTTP, DNS, SMB, etc) networking protocols
· Familiarity with operation of both Windows and Linux based systems.
· Proficient with scripting languages such as Python or PowerShell
· Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
WORKING CONDITIONS
Environmental Conditions
· Monday - Friday, regular business hours
· Hybrid position
Strength Demands
· Light – 20 lbs. Maximum lifting with frequent lift/carry up to 10 lbs. A job is light if less lifting is involved but significant walking/standing is done or if done mostly sitting but requires push/pull on arm or leg controls.
Physical Requirements
· Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; Stoop, Kneel, Crouch, or Crawl; See; Push or Pull
Employees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
Happy - Be Infectious.
Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.
Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.
Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.
Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.
Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.
Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
The contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractor’s legal duty to furnish information. 41 CFR 60-1.35(c)