Senior Cyber Security Engineer
Onsite Location: MacDill AFB, FL
Active Top Secret Security Clearance Required
Kalani Consulting Inc., recently awarded Best and Brightest Companies to Work for in The Nation for the second year in a row and Washington Post’s Top Workplaces of 2023 is looking to add more talent to our team! Kalani is a fast-growing small business located in Northern Virginia with an increasing base of government customers. We specialize in Information Technology, and management consulting. We offer very competitive salaries and benefits and are an employee-focused company. Join us and experience the Aloha Spirit!
Overview:
Review Cyber Intelligence and identify how current threats affect networks.
Perform Cybersecurity Detection and Incident Response activities for a large Program; coordinates with government Program staff, USAF, and other government agencies to assist in the creation, dissemination, direction, and auditing of program policy, standards, and operating procedures.
Review cyber events and document Cybersecurity incidents as directed in SINCE and ServiceNow. Additionally, produce After Action Reports to close Cybersecurity incidents.
Work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, SPLUNK, SIEM, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems.
Work with vendors to ensure the CND Tool suits detect and capture required cyber incidents, to include latest industry threats and zero-days, etc.
Review intelligent reports and provide daily Cyber Assessment on the impact to networks.
Recognize and codify attacker tools, tactics, and procedures (TTPs) in indicators of compromise (IOCs) that can be applied to current and future investigations.
Utilize network and endpoint defensive tools to identify and analyze potential breaches or threat activity.
Research and develop methods of tracking and detecting malicious activity within a network.
Be available for after-hours support when required. Incident response is a vital position to respond to critical cyber-attacks and our Enterprise is a 24/7 operation.
Participate in "hunt missions" using threat intelligence, analysis of anomalous log data and results of brainstorming sessions to detect and eradicate threat actors and protection teams on customer’s networks.
Continuously improve processes for use across multiple detection sets for more efficient operations.
Perform malware analysis with CND tools.
Create, modify, and tune IDS/IDPS Signature Rule Generation (Snort).
Create Splunk dashboarding, reports, and alerts with reference to Security detection and Incident Response.
Utilize available resources to conduct Cybersecurity activities, and report to senior staff and government personnel on overall program security posture.
Communicate tactical and strategic threat information to Government leaders, Cybersecurity-Ops and A&A (formerly C&A) Staff to assist them in making cyber risk decisions and to mitigate threats
Coordinates with OUSDI, USAF, DISA, and other organizations in support of audits and inspections and provides all necessary documentation as required for Blue Team, Red Team, CPT, BGX Cert, SAVs, ST&Es, and CCRI.
Communicates alerts to agencies regarding intrusions and compromises to their network infrastructure, applications, and operating systems.
Assists with implementation of countermeasures or mitigating controls.
Ensures the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices.
Work with the Information Assurance Team, Security Manager and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by government.
Provides guidance and work leadership to less-experienced technical staff members.
Maintains current knowledge of relevant technology as assigned.
Participates in special projects as required.
Provide Incident Detection through understanding malware and how to defend and mitigate infections. Triage malware, extracting relevant host and network-based indicators from malware samples.
Qualifications:
Required Qualifications:
5+ years of experience required
Must possess and maintain a TS/SCI clearance
BA/BS degree – may substitute additional years of experience
Comprehensive knowledge of data security administration principles, methods, and techniques
Must meet DOD 8570.01M requirements for IAT Level II & CSSP-Incident Responder
Familiarity with System & Network concepts, user authentication, and use of Cyber Stacks
Understanding of DHS/DoD policies and procedures, including NIST 800-53, CJCSM 6510.01 and other applicable policies
Preferred Qualifications:
Security Operations Center (SOC) Experience
ESS (HBSS) Proficiency
ACAS Proficiency
SPLUNK & SYSLOG data normalization
The ability to work and set priorities on multiple projects/tasks at once and operate in a dynamic, fast-paced team-oriented environment
The work is typically performed in an office environment, which requires normal safety precautions; work may require some physical effort in the handling of light materials, boxes, or equipment
KCI is an Equal Opportunity Employer that values the strength diversity brings to the workplace. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status, or any other characteristic protected by law.