. Provide in-depth analysis of cyber threat actor behavior and create detailed white papers to inform DHS NSS of potential risks... of Operations (CONOPs), to streamline and enhance the authorization process. Analyze cyber risk indicators stemming from system...
: Strong experience with PCAP collection, security monitoring, threat hunting, packet analysis, malware analysis, signature development... protecting critical infrastructure from cyber threats and ensuring the continuous, safe operation of our industrial control...
, security monitoring, threat hunting, packet analysis, malware analysis, signature development, shell scripting. Proficiency in... critical infrastructure from cyber threats and ensuring the continuous, safe operation of our industrial control systems...
, performing analysis, and building/documenting response activities required during cyber security incident response, including...), Insider Threat Office (SIII), in addition to other law enforcement and counterintelligence personnel as required to perform...
who has extensive experience and a proven win record working with agencies such as the Defense Threat Reduction Agency... in areas such as Systems Engineering and Integration, cyber exploitation and defense, research & development...
. What You’ll Get to Do: Coordinate and implement tasks, performing analysis, and building/documenting response activities... required during cyber security incident response, including but not limited to actions such as implementing containment measures, IP blocks...
-gathering skills, interpretation/analysis of complex information skills. In collaboration with AI/ML leadership, support... Strategy, along with the desired protection success criteria, CI Support Plans (CISP), company threat assessments, OPSEC plans...
) environment, including the review, testing, analysis, and development of threat prevention measures to ensure the cyber security... and system architectures to maintain and enhance the cyber security and reliability of the Industrial Control Systems(ICS...
, analysis, and development of threat prevention measures to ensure the cyber security of the ICS environment. Use in-depth... and enhance the cyber security and reliability of the Industrial Control Systems(ICS) environment, including the review, testing...
includes malware and implant analysis, and forensic artifact handling and analysis. When a CIRT is stood up, all contractors in... outcomes in the event of a cyber-incident. All Contractor personnel performing CSOC Tier 2 services shall have or obtain...