We are looking for a Cyber Hunt Analyst with Data Science experience to apply strong cyber security, Defensive Cyber Operations (DCO), and networking domain knowledge to support cyber analytics product development, threat analysis, statistical analysis, model development, and direct customer mission support. Regular cyber hunt activities consist of hunting for threats, reporting on findings, and converting tools, techniques, and processes into automated capabilities for the current cyber platform. Regular data science activities consist of operational research, statistical analysis, hypothesis testing, model building/testing, and communicating results using visualizations. Will also be responsible for collecting customer Cyber Operations requirements, generating use cases, providing Cyber SME support, and system training to end users.
Essential Job Responsibilities
-
Conduct threat hunt operations on assigned JCRS-D (Big Data Platforms).
-
Present threat hunt findings through live - interactive remote conference sessions.
-
Perform data analytics across disparate data sets.
-
Assist customer(s) with their threat hunting operations on location as required.
-
Perform quality assurance checks on data that is resident on JCRS-D.
-
Evaluate and analyze new data feeds to determine relevance and usability of data.
-
Support JCRS-D analytic requests (data search, visualizations, dashboards..etc).
-
Provide real time customer support during normal working hours (JCRS-D support chat room).
-
Maintain situational awareness of emerging cyber threats for possible action and notification to an impacted customer(s).
-
Support JCRS-D demonstration requests to showcase various capabilities of the platform.
-
Support JCRS-D training events either in person or virtually.
-
Provide advice on data enrichment and functions to enhance customer experience.
-
Other duties as assigned.
Minimum Qualifications
-
Security Clearance - A current TS/SCI level U.S. Government clearance with Polygraph is required. U.S. Citizenship required.
-
5+ years experience in cyber security operations related fields with Bachelors in Information Technology, Cyber Security or related field; 3 years relevant experience with Masters in realted field; or High School Diploma or equivalent and 9 years relevant experience.
-
Experience with the DoD customers, ideally supporting US Cyber Command, USMC, DISA or DCDC
-
Proficient in various query languages (SQL, KQL (Kusto))
-
Proficient in Python and bonus for strong experience using Jupyter notebooks
-
Experience with dashboarding/visualizations (Power-BI, Superset)
-
Familiarity with cloud providers and environments (Azure, AWS, Google Cloud Platform)
-
Desire to grow professional and personally
-
Ability to complete technical tasks without supervision
-
Ability to foster and support a collaborative working environment
-
Excellent public speaking, presentation, and customer service skills.
-
Positive and energetic attitude
-
Critical thinking and natural curiosity for all things cybersecurity
-
Cyber Hunt methodologies and techniques
-
SIEMs - (e.g., Splunk, Q-Radar, ELK)
-
SOARs (e.g., Sentinel, CORTEX, X-SOAR)
-
Developing and deploying threat detection signatures
-
Detecting host and network-based intrusions
-
Collecting data from a variety of cyber defense resources. (e.g., CVE, OSINT)
-
Recognizing and categorizing types of vulnerabilities and associated attacks
-
Reading and interpreting signatures (e.g., SNORT, SIGMA, Yara, YAML)
-
Cyber defense and vulnerability assessment tools and their capabilities
-
Network traffic analysis methods (e.g.,TCP-DUMP, Wireshark, Bro/Zeek)
-
Familiar with cyber attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks), and incident response and handling methodologies. (e.g., MITRE ATT&CK, LM Killchain)
-
Intrusion Detection System (IDS)/Intrusion Prevention System (IPS) tools and applications
-
Must have or ability to obtain within 90 days of hire - Data+, Security+, CySA+, GCIH, GNFA, GCFA or other industry recognized Cybersecurity Certification.
-
Ability to work a hybrid schedule on customer site in Fort Meade, MD on average 3 days a week. Flexibility is essential to adapt to schedule changes as needed.
Preferred Requirements
-
DoD SOC experience is a plus
Benefits Offered:
Medical, Dental, Vision Insurance - 100% Company Paid Premiums
STD, LTD, and Life Insurance - 100% Company paid
401K – Automatic 10% company contribution; no matching required
PTO - 4 weeks/year
Holidays - 11 paid/year
Birthdays off with pay
Referral Bonuses – Upfront AND Annually Recurring
Open Source Bonuses – Contribute to our Github projects
Professional Development – Paid training, Certifications, and Enrichment
ABOUT PHOENIX OPERATIONS GROUP:
Phoenix Operations Group is a high-end engineering services company dedicated to protecting and advancing our national cyber resources. As a small company, we rely on innovation to continually advance our employees' skills and provide game-changing solutions to our customers.
Our technical competencies include Big Data analytics (batch and streaming), Cloud Computing infrastructure, multi-INT visualization, and enterprise architectures. We support operational missions (All-Source, Financial, CND) and serve as Product Owners for our open-source research initiatives.
Please visit us at http://www.phoenix-opsgroup.com for more information.
Phoenix Operations Group is an Equal Opportunity Employer. Phoenix Operations Group does not discriminate based on race, religion, color, sex, gender, gender identity, sexual orientation, age, non-disqualifying physical or mental disability, national origin, veteran status, or any other basis covered by appropriate law. All employment is decided based on qualifications, merit, and business needs.