Job opening: Information Technology Specialist (Security)
Salary: $99 200 - 185 930 per year
Published at: Aug 13 2024
Employment Type: Full-time
This position is located in the Department of Technology Services (DTS), IT Security Office (ITSO), Security Operations Division (SOD), Cyber Threat Hunt Branch. The incumbent of this position supports Defensive Cyber Operations through deliberate and ad hoc missions to search and detect for malicious intruders and indicators of compromise within the Judiciary's IT environment.
Duties
The incumbent is responsible for identifying previously unknown threats that impact the confidentiality, integrity, or availability of judicial data by conducting proactive and iterative hypothesis-based threat hunts across the Federal Judiciary. The incumbent will provide subject matter expertise and operational support to the Security Operation Center's 24/7 continuous monitoring and incident response operations and facilitate the implementation of Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM) as necessary to contain and remove malicious threats, as well as assist impacted organizations with recovery to full operational status.
Duties of the position include but are not limited to:
Developing, articulating, and planning technical iterative threat hunt hypotheses.
Developing and documenting required application level, operating system level, and network level artifacts for each hunt mission.
Conducting iterative hypothesis based TTP hunts and document hunt output to be shared with other teams with minimal direction using a combination of Splunk, CrowdStrike, Microsoft Threat Explorer, Microsoft Sentinel, and Jupyter/Python Notebooks
Performing technical analysis of ELF/PE binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis; to ascertain functionality, capability, call-backs, assist with attribution and identification of indicators of compromise.
Supporting escalations from the Incident Response team and re-prioritize efforts for risk reduction, if necessary
Participating in daily scrum standups and effectively communicating technical findings/highlights to the Cyber Threat Hunt Branch Chief.
Communicating proactively any relevant findings outside of the daily scrum standups.
Recommending development of new Sigma detections for monitoring threat activity once identified.
Developing and modifying python scripts or programs necessary for the collection of hunt artifacts on-premises using CrowdStrike and in the cloud infrastructure using Azure PowerShell.
Developing and modifying CrowdStrike RTR scripts necessary for running YARA rules on disk and in memory.
Developing and modifying Splunk (SPL) and Sentinel (KQL) queries to conduct hunt missions.
Developing technical webinars that advance and share technical knowledge exchange with other teams in the Security Operations Division.
Providing monthly input on threat detection efficacy.
Making recommendations for improving threat detection efficacy.
Operating with exceptional customer focus with attention to detail and bias for action.
Managing competing priorities in dynamic, fast-paced enterprise environment.
Qualifications
Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions.
Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated hands-on technical experience in ALL of the following:
Planning, executing, and documenting proactive and iterative hypothesis-based hunts with minimal direction;
Conducting hunt operations to detect and remove potentially malicious cyber actors from organizational IT environments; and
Reviewing unstructured/structured application logs from custom applications.
Desired, but Not Required: Applicants with one or more of the following information technology certifications are highly desired:
Offensive Security Certified Professional (OSCP)
GIAC Reverse Engineering Malware (GREM)
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
Education
This position does not require education to qualify.
Contacts
- Address Department of Technology Services
One Columbus Circle, NE
Washington, DC 20544
US
- Name: Kymberli Camber
- Phone: (210) 301-6303
- Email: [email protected]
Map