Cyber Security Technician (S-NET)

USA, Fulton, 8120 Maple Lawn Boulevard, Suite 235-400, Maryland, United States

Apply now Apply later

Title:

Cyber Security Technician (S-NET)

Belong. Connect. Grow. with KBR!

KBR’s National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country’s most critical role – protecting our national security.

Why Join Us?

  • Innovative Projects: KBR’s work is at the forefront of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions.
  • Collaborative Environment: Be part of a dynamic team that thrives on collaboration and innovation, fostering a supportive and intellectually stimulating workplace.
  • Impactful Work: Your contributions will be pivotal in designing and optimizing defense systems that ensure national security and shape the future of space defense.

Key Responsibilities:

  • Support a government Cyber Security Operation Center (CSOC) andl conduct security event monitoring, advanced analytics, and response activities in support of the CND operational mission with diverse backgrounds in cyber security systems operations, analysis and incident response.
  • Perform technical analysis on a wide range of cybersecurity issues, with a focus on network activity, host activity, and data.  This includes, but is not limited to: network flow (i.e. netflow) or related forms of session summary data, signature-based IDS/IPS alert/event data, full packet capture (PCAP) data, proxy and application server logs (various types).
  • Triage IDS/IPS alerts, collect related data from various systems, review open and closed source information on related threats & vulnerabilities, diagnose observed activity for likelihood of system infection, compromise or unintended/high-risk exposure.
  • Prepare analysis reports detailing background, observables, analysis process & criteria, and conclusions.
  • Analyze large volumes of network flow data for specific patterns/characteristics or general anomalies, to trend network activity and to correlate flow data with other types of data or reporting regarding enterprise-wide network activity.
  • Leverage lightweight programming/scripting skills to automate data-parsing and simple analytics. Document key event details and analytic findings in analysis reports and incident management systems. Identify, extract and characterize network indicators from cyber threat intelligence sources, incident reporting and published technical advisories/bulletins.
  • Assess cyber indicators/observables for technical relevance, accuracy, and potential value/risk/reliability in monitoring systems. Recommend detection and prevention/mitigation signatures and actions as part of a layered defensive strategy leveraging multiple capabilities and data types.
  • Develop IDS/IPS signatures, test and tune signature syntax, deploy signatures to operational sensors, and monitor and tune signature and sensor performance.
  • Fuse open-source threat & vulnerability information with data collected from sensors across the enterprise into cohesive and comprehensive analysis.
  • Develop security metrics and trend analysis reports

Work Environment:

  • Location: Annapolis Junction MD [On-site]
  • Travel Requirements: Minimal 0-20% Travel
  • Working Hours: Standard 40 hour per week

Qualifications :

Required:

  • Clearance: Top Secret with SCI
  • Requires 2 to 5 years with BS/BA or 0 to 2 years with MS/MA/MBA or 8 to 10 years with no degree.
  • Bachelor’s degree in Computer Science, Information Systems, or equivalent education or work experience (additional relevant work experience can be substituted for a degree)
  • Must have a current DoD 8570.1-M IAT Level II certification

Desired:

  • Desired Certifications: CEH, GCIH, GCIA, GCFA
  • 1+ years in a SOC or Incident Response role
  • Experience with Cisco Firepower, Cisco Sourcefire, Cisco Advanced Malware Protection, Cisco Stealthwatch, Cisco Umbrella
  • Experience with deploying and writing signatures (Snort, YARA, HIPS)
  • Experience with network hunting utilizing Zeek/Bro
  • Experience with McAfee ePO, HBSS
  • Splunk: Create log searches, dashboards, setting up alerts, and scheduled reports to help detect and remediate security concerns.
  • Experience with ArcSight
  • Experience with Wireshark and packet analysis
  • Experience with Tanium or other endpoint solutions
  • Working knowledge of scripting languages such as Python, PowerShell, Shell
  • Knowledge of Regular Expressions
  • Knowledge of server and client operating systems
  • Participate in development and reporting of security metrics
  • Experience in a SOC or Incident Response role

Basic Compensation:

$85,000 to $95,000

This range is for the Maryland area only

The offered rate will be based on the selected candidate’s knowledge, skills, abilities and/or experience and in consideration of internal parity.

Additional Compensation:

KBR may offer bonuses, commissions, or other forms of compensation to certain job titles or levels, per internal policy or contractual designation. Additional compensation may be in the form of a sign on bonus, relocation benefits, short term incentives, long term incentives, or discretionary payments for exceptional performance.

Ready to Make a Difference?

If you’re excited about making a significant impact in the field of space defense and working on projects that matter, we encourage you to apply and join our team at KBR. Let's shape the future together.

KBR Benefits

KBR offers a selection of competitive lifestyle benefits which could include 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule. We support career advancement through professional training and development.

Belong, Connect and Grow at KBR

At KBR, we are passionate about our people and our Zero Harm culture.  These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a People First company.  That commitment is central to our team of team’s philosophy and fosters an environment where everyone can Belong, Connect and Grow. We Deliver – Together. 

KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.

Apply now Apply later
Job stats:  0  0  0

Tags: Analytics ArcSight CEH Clearance CND Computer Science CSOC DoD DoDD 8570 GCFA GCIA GCIH IDS Incident response IPS Malware Monitoring PCAP PowerShell Python Scripting Snort SOC Sourcefire Splunk Strategy Threat intelligence Top Secret Vulnerabilities

Perks/benefits: 401(k) matching Career development Competitive pay Flex hours Flexible spending account Flex vacation Health care Insurance Relocation support Salary bonus Signing bonus

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.