About The Position

ICF seeks an experienced Senior Threat Detection & Response Engineer to support the research and development of new cyber analytic capabilities that will help the US protect and defend its networks and critical information systems. This essential role will support a large federal cyber security analytic program. Your work will contribute to the knowledge of how cyber-attacks work, how vulnerabilities are exploited, and the way hostile cyber actors operate. Utilize your skills to help experiment and prototype future cyber capabilities for implementation at large-scale. As the Senior Threat Detection & Response Engineer, you will work as the overall responsible person for the design and development of countermeasures capabilities. This is an opportunity to contribute to an important project from its beginning, work with the latest and emerging technologies, and all while building a great career at ICF! The ideal candidate has a strong background in cybersecurity detection and countermeasures with proficiency in dashboard technologies including an ability to translate mission requirements. You are focused on results, a self-starter, and have demonstrated success for using analytics to drive the understanding, growth, and success of the analysis. This role is primarily telework-based with occasional meetings at client locations (Arlington, Virginia or Pensacola, FL) or ICF facilities within the Washington, DC (DMV area).

Requirements

  • Bachelor’s degree with 12+ or Master’s degree with 10+ years of experience in IT, Cyber, Engineering, or a related field
  • 5 or more years of implementing custom and high-impact security platforms in critical program areas.
  • A minimum of 5 years of experience with advanced cyber threats, tools, techniques, and processes (e.g., Threat Hunt, Incident Response, Investigations, Technical Reporting, etc.)
  • 5 years of experience using network security analysis/IDS tools is required
  • 5 or more years of experience analyzing packet capture and NetFlow data with an understanding of current cyber threats and trend derived from multiple sources (e.g., open-source, intelligence products, etc.)
  • Position requires a minimum of 5 years of experience with a different types of Malware including detection methods, attack vectors, and vulnerabilities used
  • Experience with query languages (e.g., SQL, KQL, etc.)
  • Experience developing advanced dashboards (e.g., Kibana, Splunk, etc.)
  • Experience with different cybersecurity frameworks and knowledge bases to identify tactics, techniques, and procedures of known actors
  • Understanding of mathematics behind machine learning algorithms
  • Working knowledge of open-source distributed massively parallel processing databases such as GreenPlum and open-source big data technologies such as Apache Hadoop, Apache Kafka, etc.
  • Active security clearance required as part of client contract requirements
  • US Citizenship required as part of client contract requirements

Nice To Haves

  • Active High level clearance
  • Interpersonal skills and the ability to communicate effectively with various clients in order to explain and elaborate on technical details
  • Practical experience with different scripting languages (e.g., Python, JavaScript, etc.)
  • Practical experience with the Databricks Intelligence Platform
  • Experience with system vulnerability management
  • Knowledge of Linux/Unix and Windows operating systems security
  • Knowledge of computer programming and scripting languages
  • Scaled Agile Framework (SAFe) experience
  • (ISC)2 Certified Information Systems Security Professional (CISSP) certification desired

Responsibilities

  • Oversee the design of the operational effects as described by the Government
  • Evaluate alternatives and provide well-informed recommendations on technical options for design and development
  • Translate mission requirements into a variety of software products, evolutionary prototypes, and advanced countermeasure capabilities
  • Identify optimal methods for aggregating, storing, correlating, and visually depicting various types of data
  • Advise on data preparation, implementation of techniques, visualizations, and employment of analytics developed by ICF and customer partners
  • Assess current use of cyber tools by analysts and assess whether efficiencies can be made via alternate use of current or adoption of alternate tools
  • Problem-solve by identifying potential tools/processes to support needs by capturing areas of improvement that can be translated into functional requirements for future planning
  • Identify areas of technical training gaps and proposed approaches to methods (hands on, online modules, etc.) to improve the use of tools and data in support of the cybersecurity mission.
  • Participate in post-engagement review
  • Effectively communicate with leadership to ensure awareness of progress and/or challenges

Benefits

  • Reasonable Accommodations are available, including, but not limited to, for disabled veterans, individuals with disabilities, and individuals with sincerely held religious beliefs, in all phases of the application and employment process.
  • Read more about workplace discrimination rights or our benefit offerings which are included in the Transparency in (Benefits) Coverage Act.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service