Location: | Washington, DC, USA | Pay Rate: | |
Pay Type: | Employment Type: | Full Time |
Halvik Corp delivers a wide range of services to 13 executive agencies and 15 independent agencies. Halvik is a highly successful WOB business with more than 50 prime contracts and 500+ professionals delivering Digital Services, Advanced Analytics, Artificial Intelligence/Machine Learning, Cyber Security and Management Consulting Solutions and Cutting Edge Technology across the US Government. Be a part of something special!
Responsibilities: Identifies threat tactics, methodologies, gaps, and shortfalls aligned with the MITRE ATT&CK Framework and the Azure Threat Research Matrix (ATRM). Performs Hypothesis-based or Intelligence-based Cyber Threat Hunts to identify threats and risks within environments. Uses cloud-native techniques and methods to identify and create threat detections for automated response activities. Uses Agile methodology to organize intelligence, hunts and project status. Able to independently research intelligence reports to find actionable data for conducting intel or hypothesis-based hunts. Explores and correlate large data sets to uncover novel attack techniques, monitor and catalog changes in activity group tradecraft, and investigate alerts for enterprise customers. Conducts analysis of log files, evidence, and other information to determine the best methods for identifying the perpetrator(s) of a network intrusion. Confirms what is known about an intrusion and discover new information, if possible, after identifying intrusion via dynamic analysis. Creates a forensically sound duplicate of the evidence (i.e., forensic image) that ensures the original evidence is not unintentionally modified, to use for data recovery and analysis processes. Provides a technical summary of findings in accordance with established reporting procedures. Ensures that chain of custody is followed for all digital media acquired in accordance with the Federal Rules of Evidence. Recognizes and accurately report forensic artifacts indicative of a particular operating system. Extracts data using data carving techniques (e.g., Forensic Tool Kit [FTK], Foremost). Collects and analyzes intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
Requirements:
- Bachelor's degree and at least 10 years of relevant experience.
- CISSP, CEH, or equivalent certifications.
Halvik offers a competitive full benefits package including:
-
Apply Now
