Threat Detection & Response Engineer, Senior (Security Clearance Required)

ICFPensacola, VA
1d$119,323 - $202,850Remote

About The Position

ICF is actively recruiting for an experienced and cleared Senior Threat Detection & Response Engineer to support the research and development of new cyber analytic capabilities that will help the US protect and defend its networks and critical information systems. The successful cleared candidate will act as a Senior Threat Detection & Response Engineer to support a large federal cyber security analytic program. Your work will contribute to the knowledge of how cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Senior Threat Detection & Response Engineer, you will work as the overall responsible person for the design and development of countermeasures capabilities. This is an opportunity to contribute to an important project from its beginning, work with the latest and emerging technologies, and all while building a great career at ICF! The ideal candidate has a strong background in cybersecurity detection and countermeasures with proficiency in dashboard technologies including an ability to translate mission requirements. You are focused on results, a self-starter, and have demonstrated success for using analytics to drive the understanding, growth, and success of the analysis. This is an opportunity to contribute to an important project from its beginning, work with the latest and emerging technologies, and all while building a great career at ICF! This role is primarily telework-based with occasional meetings at client locations (Arlington, VA or Pensacola, FL) or ICF facilities within the Washington, DC metro area.

Requirements

  • Active US government issued security clearance required
  • US Citizenship required as part of client contract requirements
  • Bachelor’s degree with 12+ or Master’s degree with 10+ years of experience in IT, Cyber, Engineering, or a related field
  • Working knowledge of open-source distributed massively parallel processing databases such as GreenPlum and open-source big data technologies such as Apache Hadoop, Apache Kafka, etc.
  • 5 or more years of implementing custom and high-impact security platforms in critical program areas.
  • Position requires at least 5 years of advanced cyber threats, tools, techniques, and processes (e.g., Threat Hunt, Incident Response, Investigations, Technical Reporting, etc.)
  • Must have at least 5 years of experience using network security analysis/IDS tools
  • A minimum of 5 years of experience analyzing packet capture and NetFlow data with an understanding of current cyber threats and trend derived from multiple sources (e.g., open-source, intelligence products, etc.)
  • 5 or more years of experience with different types of Malware including detection methods, attack vectors, and vulnerabilities used
  • Experience with query languages (e.g., SQL, KQL, etc.)
  • Hands on experience developing advanced dashboards (e.g., Kibana, Splunk, etc.) is required
  • Experience with different cybersecurity frameworks and knowledge bases to identify tactics, techniques, and procedures of known actors
  • Must have a solid understanding of mathematics behind machine learning algorithms

Nice To Haves

  • Interpersonal skills and the ability to communicate effectively with various clients in order to explain and elaborate on technical details
  • Practical experience with different scripting languages (e.g., Python, JavaScript, etc.)
  • Practical experience with the Databricks Intelligence Platform
  • Experience with system vulnerability management
  • Knowledge of Linux/Unix and Windows operating systems security
  • Knowledge of computer programming and scripting languages
  • Scaled Agile Framework (SAFe) experience
  • (ISC)2 Certified Information Systems Security Professional (CISSP) certification desired

Responsibilities

  • Oversee the design of the operational effects as described by the Government
  • Evaluate alternatives and provide well-informed recommendations on technical options for design and development
  • Translate mission requirements into a variety of software products, evolutionary prototypes, and advanced countermeasure capabilities
  • Identify optimal methods for aggregating, storing, correlating, and visually depicting various types of data
  • Advise on data preparation, implementation of techniques, visualizations, and employment of analytics developed by ICF and customer partners
  • Assess current use of cyber tools by analysts and assess whether efficiencies can be made via alternate use of current or adoption of alternate tools
  • Problem-solve by identifying potential tools/processes to support needs by capturing areas of improvement that can be translated into functional requirements for future planning
  • Identify areas of technical training gaps and proposed approaches to methods (hands on, online modules, etc.) to improve the use of tools and data in support of the cybersecurity mission.
  • Participate in post-engagement review
  • Effectively communicate with leadership to ensure awareness of progress and/or challenges
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service