Endpoint Detection and Response SME

The Challenge:

Everyone is trying to “harness the power of the cloud,” but not everyone knows how. As an Endpoint Detection and Response SME, you know how to build a cloud-based technical architecture that meets client needs and takes advantage of cloud capabilities. What if you could use your cloud architecture skills to improve the defense industry? We need you to help us develop cloud-based solutions for some of DoD's toughest challenges.

On our team, you’ll be part of a team of cloud experts as you look for ways to improve our client’s environment using current cloud capabilities. Your technical expertise will be vital as you work with our client to inform strategy and design and ensure standards are met throughout the process. You’ll recommend tools and solutions based on your research of the current environment and knowledge of various on premises, cloud based, and hybrid resources. Additionally, you’ll broaden your skillset in areas like endpoint detection and response, automation, cloud based security, and cyber threat hunt, while developing critical systems for our defense client.

Ready to transform warfighter communications with cloud technology?

Join us. The world can’t wait.

You Have:

  • 5+ years of experience with configuring and deploying enterprise endpoint security solutions, including Elastic Endgame, Crowdstrike Falcon, Carbon Black, FireEye HX, or Tanium as either deployment of solution or day to day analysis of the solution
  • Experience with triaging security events in a security operations center (SOC) environment, leveraging data collected from enterprise security solutions
  • Experience with providing status reports for the activities of the team, including metrics and KPIs
  • Knowledge of executing incident response activities and seeing incidents through to successful remediation
  • Knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions
  • Knowledge of network security architecture concepts including topology, protocols, components, and principles
  • Knowledge of malware analysis concepts and incident handling methodologies
  • Ability to obtain a security clearance
  • HS diploma or GED

Nice If You Have:

  • Experience with conducting proactive Advanced Persistent Threat (APT) and Focused Operator (FO) hunting, incident response support, and advanced analytic capabilities while providing adversary mitigation and executive level recommendations 
  • Experience with processes and procedures to analyze workstation, server, and network incidents using SIEM, behavioral analytics, and network analysis
  • Experience with monitoring and reporting changes in threat dispositions, activities, tactics, capabilities, objectives as related to designated cyber operations warning problem sets
  • Knowledge of cyber-attack stages, including reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, and covering tracks
  • Knowledge of incident triage, including scope, urgency, potential impact, and making recommendations that enable expeditious remediation
  • Ability to profile and track APT/FO actors that pose a threat in coordination with threat intelligence support teams and review and analyze log files from various sources such as SIEM, packet captures, and host logs to report any unusual or suspect activities

Clearance:
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

Not ready to apply? Join our talent community and sign up for job alerts.