About the Role
- Identify gaps in malicious activity detection capabilities
- Create new signatures / rules to improve detection of malicious activity
- Test and tune existing signatures / rules to ensure low rate of false positives
- Assist in playbook development for alert triage and Incident Response
- Define and implement alert and threat detection metrics, statistics, and analytics
- Recommend new tools/technologies to improve network visibility
- Support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering
- Author and maintain scripts for threat detection and automation
Requirements
In-depth knowledge of Firewalls/Proxies/Intrusion Detection Systems/ Domain Name Servers/DHCP/VPN and other network technologies and tools
Experience updating, maintaining, and creating IDS variables within a complex enterprise network
Expert in creating, modifying, tuning IDS signatures/SIEM Correlation Searches/yara rules and/or other detection signatures
Familiarity with disk based forensic methodologies, Windows, and Linux forensic artifacts
Experience with Endpoint Detection and Response (EDR) tools such as Carbon Black, Tanium, Crowdstrike, etc
Able to create, modify, update, and maintain Python and Powershell scripts that enhance endpoint detection capabilities
In-depth knowledge of attacker tactics, techniques, and procedures
Author, test, and maintain automation scripts within SOAR platform
Â
The candidate must currently possess a Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI). Â
Should have 5 years of experience serving as a digital media analyst or as a computer forensic analyst.
Ability to work independently with minimal direction; self-starter/self-motivated
Must Have One of the Following J3 Certifications
Tier 2 Response:
GCIH – Incident Handler
GCFA – Forensic Analyst
GCFE – Forensic Examiner
GREM – Reverse Engineering Malware
GISF – Security Fundamentals
GXPN – Exploit Researcher and Advanced Penetration Tester
GWEB – Web Application Defender
GNFA – Network Forensic Analyst
OSCP (Certified Professional)
OSCE (Certified Expert)
OSWP (Wireless Professional)
OSEE (Exploitation Expert)
CCFP – Certified Cyber Forensics Professional
CISSP – Certified Information Systems Security
CCNA Security
CCNP Security
CEH – Certified Ethical Hacker
CHFI – Computer Hacking Forensic Investigator
LPT – Licensed Penetration Tester
ECSA – EC-Council Certified Security Analyst
ENSA – EC-Council Network Security Administrator
ECIH – EC-Council Certified Incident Handler
ECSS – EC-Council Certified Security Specialist
ECES – EC-Council Certified Encryption Specialist
EnCE
Windows Forensic Examinations – FTK WFE-FTK
Computer Incident Responders Course - CIRC
Windows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CI
Forensics and Intrusions in a Windows Environment -FIWE
Preferred Qualifications
One of the following certifications:
SANS Global Information Assurance Certification (GIAC) Certified Intrusion Analyst (GCIA)Â
SANS Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA)
SANS Global Information Assurance Certification (GIAC) Certified Network Forensic Analyst (GNFA)
Certified Information System Security Professional (CISSP)
Education
BS degree in Science, Technology, Engineering, Math or related field and 8 years of prior relevant experience with a focus on cyber security or Masters with 6 years of prior relevant experience.