Expoint - all jobs in one place

The point where experts and best companies meet

Limitless High-tech career opportunities - Expoint

Microsoft Security Engineer -CTJ - POLY 
United States, Virginia 
723305480

02.04.2024

Required/Minimum Qualifications:

  • 3+ years of experience in software development lifecycle, large-scale computing, modeling, cyber security, anomaly detection, and event management (SIEM), information technology (IT), and operations incident response
    • OR Bachelor's Degree in Statistics, Mathematics, Computer Science or related field.
  • 3+ years' demonstrated experience in computer security related disciplines, including but not limited to the following subject areas: software vulnerabilities and exploitation, host\identity analysis, network traffic analysis, and web-focused security topics.
  • 3+ years demonstrated experience understanding of common attacks (Software, Network, and Service) and a history of successfully applying defensive tactics to protect against current and future attacks based on modern technologies being developed, ordemonstrated experience with Raise the Bar (RTB)
  • 3+ years in the incident management lifecycle, including escalation, communication, debugging, resolution, and problem management. Lead service teams through live site reviews and corrective action plans.

Other Requirements:

Security Clearance Requirements: Candidates must be able to meet Microsoft, customer and/or government security screening requirements are required for this role. These requirements include, but are not limited to the following specialized security screenings:

  • The successful candidate must have an active U.S. Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a Single Scope Background Investigation (SSBI) with Polygraph. Ability to meet Microsoft, customer and/or government security screening requirements are required for this role. Failure to maintain or obtain the appropriate U.S. Government clearance and/or customer screening requirements may result in employment action up to and including termination.
  • Clearance Verification: This position requires successful verification of the stated security clearance to meet federal government customer requirements. You will be asked to provide clearance verification information prior to an offer of employment.
  • Microsoft Cloud Background Check: This position will be required to pass the Microsoft Cloud background check upon hire/transfer and every two years thereafter.
  • Citizenship & Citizenship Verification: This position requires verification of U.S citizenship due to citizenship-based legal restrictions. Specifically, this position supports United States federal, state, and/or local United States government agency customers and is subject to certain citizenship-based restrictions where required or permitted by applicable law. To meet this legal requirement, citizenship will be verified via a valid passport, or other approved documents, or verified US government clearance.

Preferred Qualifications:

  • 3+ years demonstrated experience in advanced administration of Windows-based server systems, to include Active Directory?
  • 3+ years authoring scripts to manage/automate tasks related to Windows platforms, preferably with PowerShell?
  • Certifications preferred – CISSP, CEH, GCIH, GPEN, GWAPT, GDAT, GNFA, GCFA, OSCP.
  • Aptitude for learning and rapidly mastering new applications and technology.
  • Ability to multi-task and prioritizing rapidly changing task assignments.
  • Knowledge of government system security requirements and approval processes
  • At least 1 year of experience programming with PowerShell/Bash
  • Familiarity with basic SQL server administration.
  • Experience with STIGs, 800-53 controls and Risk Management Framework (RMF)
  • Prior experience managing a cloud environment
  • Experience with Virtualization (Hyper-V/Cloud VM)
  • Experience with industry tools such as Splunk, Nessus, Sentinel, Qualys, etc.

Certain roles may be eligible for benefits and other compensation. Find additional benefits and pay information here:

Responsibilities
  • Assist internal teams and customers by identifying and recognizing data and patterns that may indicate potential security issues. Raises identified security concerns with senior members of the team to discuss mitigation strategy proposals.
  • Analyzes dynamic datasets to help internal customers maintain an accurate view of owned assets exposed to the
  • Identifies and raises opportunities for automation to improve efficiency and effectiveness. Creates automation as appropriate to drive greater efficiency with high value.
  • Utilizing guidance and key operating procedures, analyzes specific aspects of attempted or successful efforts to compromise systems security. Escalates findings as appropriate within agreed response times. Develops ability to analyze independently and make recommendations.
  • Identifies potential issues with detection (e.g., false positives, noise). Engages others to escalate appropriately. Creates detections based on available data (e.g., Indicators of Compromise [IOC] and Tools Tactics Procedures [TTP]). Continues to drive automation of detection and response.
  • Executes tactical processes across kill chain. Distinguishes effective from ineffective tactics and reports accordingly to inform security posture. Maps tactics to MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix and assesses when targets pass and fail against known techniques.
  • Hunt for emerging threats using the tools and data provided, identifying and addressing risks to prevent exploitation
  • Effectively communicating (verbal and written) in a professional manner with technical and non-technical personnel
  • Works with internal and external parties as directed to push solutions to the environment to address specific threats.
  • Own and contribute to initiatives that drive continuous improvement to the Sovereign Security Foundation operations and services
  • Perform regular security monitoring to identify any possible intrusions
  • Maintain and create system documentation.
  • Deep understanding of system internals and/or hardening in the following: Windows, Linux or macOS operating systems
  • Keep up to date on emerging vulnerability, response, mitigation, threat landscape trends and use this knowledge to drive proactive threat detection.
  • Mentor and provide guidance to team members on detection and response best practices.