XOR Security is currently seeking several Detection Engineers to support an Agency-level SOC. The SOC program provides comprehensive Computer Network Defense and Response support through 24×7×365 monitoring and analysis of potential threat activity targeting the enterprise.
To ensure the integrity, security, and resiliency of critical operations, we are seeking candidates with diverse backgrounds in cyber security systems operations, analysis and incident response. Strong written and verbal communications skills are a must along with the ability to work shift.
***Regular days - Non shift work
Basic Qualifications:The Cyber Threat Detection Engineer SME shall have the following qualifications: • In-depth knowledge of Firewalls/Proxies/Intrusion Detection Systems/ Domain Name Servers/DHCP/VPN and other network technologies and tools • Experience updating, maintaining, and creating IDS variables within a complex enterprise network • Expert in creating, modifying, tuning IDS signatures/SIEM Correlation Searches/yara rules and/or other detection signatures • Familiarity with disk based forensic methodologies, Windows, and Linux forensic artifacts • Experience with Endpoint Detection and Response (EDR) tools such as Carbon Black, Tanium, Crowdstrike, etc • Able to create, modify, update, and maintain Python and Powershell scripts that enhance endpoint detection capabilities • In-depth knowledge of attacker tactics, techniques, and procedures • Author, test, and maintain automation scripts within SOAR platform
- The candidate must currently possess a Secret Clearance. In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).
- BS degree in Science, Technology, Engineering, Math or related field and 8 years of prior relevant experience with a focus on cyber security or Masters with 6 years of prior relevant experience.
- Should have 5 years of experience serving as a digital media analyst or as a computer forensic analyst.
- Ability to work independently with minimal direction; self-starter/self-motivated
Primary Qualifications:• Identify gaps in malicious activity detection capabilities • Create new signatures / rules to improve detection of malicious activity • Test and tune existing signatures / rules to ensure low rate of false positives • Assist in playbook development for alert triage and Incident Response • Define and implement alert and threat detection metrics, statistics, and analytics • Recommend new tools/technologies to improve network visibility • Support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering • Author and maintain scripts for threat detection and automation Must have one of the following certifications: GCIH – Incident Handler
GCFA – Forensic Analyst
GCFE – Forensic Examiner
GREM – Reverse Engineering Malware
GISF – Security Fundamentals
GXPN – Exploit Researcher and Advanced Penetration Tester
OSCP (Certified Professional)
OSCE (Certified Expert)
OSWP (Wireless Professional)
OSEE (Exploitation Expert)
CCFP – Certified Cyber Forensics Professional
CISSP – Certified Information Systems Security
CHFI – Computer Hacking Forensic Investigator
LPT – Licensed Penetration Tester
ECSA – EC-Council Certified Security Analyst
Windows Forensic Examinations – FTK WFE-FTK
Computer Incident Responders Course - CIRC
Windows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CI
Forensics and Intrusions in a Windows Environment -FIWE
XOR Security offers a very competitive benefits package including health insurance coverage from the first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.
XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.
Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP and a SECRET CLEARANCE.