Host Based Systems Analyst III

ARSIEMArlington, VA
64d

About The Position

At ARSIEM Corporation we are committed to fostering a proven and trusted partnership with our government clients. We provide support to multiple agencies across the United States Government. ARSIEM has an experienced workforce of qualified professionals committed to providing the best possible support. As demand increases, ARSIEM continues to provide reliable and cutting-edge technical solutions at the best value to our clients. That means a career packed with opportunities to grow and the ability to have an impact on every client you work with. ARSIEM is looking for a Cyber Network Defense Analyst (CNDA) with Cloud Forensics experience. This position will support one of our Government clients in Arlington, VA.

Requirements

  • BS in Computer Science, Cybersecurity, Computer Engineering, or related field; OR HS Diploma with 7+ years relevant experience.
  • 5+ years of experience in cyber forensic investigations with leading tools and techniques.
  • Strong understanding of SaaS, PaaS, and IaaS in cloud environments and hybrid identity security.
  • Expertise in acquiring forensically sound evidence, analyzing attacks, and reporting findings.
  • Knowledge of M365/Azure, hybrid identity, and threats targeting these solutions.
  • Knowledge of AWS, IAM, and best practices for cloud identity security.
  • This position requires an Active TS/SCI clearance and the ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability.

Nice To Haves

  • Strong API and scripting skills (PowerShell, Python, Bash, JavaScript) for automation and threat detection.
  • Knowledge of common and advanced cloud attacks and techniques, and how to detect and mitigate these threats.
  • Proficiency with cloud automation and orchestration tools (Terraform, Kubernetes, CloudFormation, Azure Resource Manager, Docker).
  • GCLD, GCFR, GCFA, GCFE, GCIH, EnCE, CCE, CFCE, CISSP, CCSP, AWS, or Microsoft Cloud/Security certifications.

Responsibilities

  • Conduct forensic acquisition and analysis from on-premises and cloud platforms (Entra ID/Azure AD, M365, AWS, GCP, SaaS) to identify compromise activity, persistence mechanisms, and data exfiltration.
  • Investigate and respond to incidents and attacks targeting cloud and hybrid identity.
  • Correlate cloud control-plane events and network telemetry (e.g., Azure Activity Logs, AWS CloudTrail, VPC Flow Logs) to reconstruct attacker timelines, validate IOCs, and identify post-compromise privilege escalation.
  • Develop and operationalize detection logic and automation using cloud-native tools (Microsoft Defender, Sentinel, AWS GuardDuty, GCP Chronicle) and scripting (PowerShell, Python, Bash), integrating threat intelligence feeds and indicators.
  • Produce technical reports, incident documentation, and containment recommendations integrating cloud, identity, and endpoint findings; support development of incident response playbooks and procedures for cloud and hybrid environments.
  • Support cloud development and automation projects to enhance threat emulation, investigative, and hunting capabilities.
  • Coordinate with internal teams, government staff, and external stakeholders to validate alerts and investigate preliminary findings.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service