USNLX Ability Jobs

USNLX Ability Careers

Job Information

Administrative Office of the U.S. Courts Information Technology Specialist (Security) in Washington, District Of Columbia

Summary This position is located in the Department of Technology Services (DTS), IT Security Office (ITSO), Security Operations Division (SOD), Cyber Threat Hunt Branch. The incumbent of this position supports Defensive Cyber Operations through deliberate and ad hoc missions to search and detect for malicious intruders and indicators of compromise within the Judiciary's IT environment. Responsibilities The incumbent is responsible for identifying previously unknown threats that impact the confidentiality, integrity, or availability of judicial data by conducting proactive and iterative hypothesis-based threat hunts across the Federal Judiciary. The incumbent will provide subject matter expertise and operational support to the Security Operation Center's 24/7 continuous monitoring and incident response operations and facilitate the implementation of Defensive Cyber Operations - Internal Defensive Measures (DCO-IDM) as necessary to contain and remove malicious threats, as well as assist impacted organizations with recovery to full operational status. Duties of the position include but are not limited to: Developing, articulating, and planning technical iterative threat hunt hypotheses. Developing and documenting required application level, operating system level, and network level artifacts for each hunt mission. Conducting iterative hypothesis based TTP hunts and document hunt output to be shared with other teams with minimal direction using a combination of Splunk, CrowdStrike, Microsoft Threat Explorer, Microsoft Sentinel, and Jupyter/Python Notebooks Performing technical analysis of ELF/PE binaries through controlled execution and/or static analysis of assembly code, overcoming techniques designed to defeat analysis; to ascertain functionality, capability, call-backs, assist with attribution and identification of indicators of compromise. Supporting escalations from the Incident Response team and re-prioritize efforts for risk reduction, if necessary Participating in daily scrum standups and effectively communicating technical findings/highlights to the Cyber Threat Hunt Branch Chief. Communicating proactively any relevant findings outside of the daily scrum standups. Recommending development of new Sigma detections for monitoring threat activity once identified. Developing and modifying python scripts or programs necessary for the collection of hunt artifacts on-premises using CrowdStrike and in the cloud infrastructure using Azure PowerShell. Developing and modifying CrowdStrike RTR scripts necessary for running YARA rules on disk and in memory. Developing and modifying Splunk (SPL) and Sentinel (KQL) queries to conduct hunt missions. Developing technical webinars that advance and share technical knowledge exchange with other teams in the Security Operations Division. Providing monthly input on threat detection efficacy. Making recommendations for improving threat detection efficacy. Operating with exceptional customer focus with attention to detail and bias for action. Managing competing priorities in dynamic, fast-paced enterprise environment. Requirements Conditions of Employment CONDITIONS OF EMPLOYMENT All information is subject to verification. Applicants are advised that false answers or omissions of information on application materials or inability to meet the following conditions may be grounds for non-selection, withdrawal of an offer of employment, or dismissal after being employed. Selection for this position is contingent upon completion of OF-306, Declaration of Federal Employment during the pre-employment process and proof of U.S. citizenship for competitive status positions or conversion to a competitive status position with the AO. If non-citizens are considered for hire into a temporary or any other position with non-competitive status or when it is confirmed by the AO Human Resources Office there are no qualified U.S. citizens for a competitive status position (unless prohibited by a law or statue), non-citizens must provide proof of authorization to work in the U.S. and proof of entitlement to receive compensation. Additional information on the employment of non-citizens can be found at USAJOBS Help Center | Employment of non-citizens/. For a list of documents that may be used to provide proof of citizenship or authorization to work in the United States, please refer to Form I-9, Employment Eligibility Verification. All new AO employees will be required to complete an FBI fingerprint-based national criminal database and records check and pass a public trust suitability check. New employees to the AO will be required to successfully pass the E-Verify employment verification check. To learn more about E-Verify, including your rights/responsibilities, visit https://www.e-verify.gov/. All new AO employees are required to identify a financial institution for direct deposit of pay before appointment. You will be required to serve a trial period if selected for a first-time appointment to the Federal government, transferring from another Federal agency, or serving as a first-time supervisor. Failure to successfully complete the trial period may result in termination of employment. If appointed to a temporary position, management may have the discretion of converting the position to permanent depending upon funding and staffing allocation. Qualifications Applicants must have demonstrated experience as listed below. This requirement is according to the AO Classification, Compensation, and Recruitment Systems which include interpretive guidance and reference to the OPM Operating Manual for Qualification Standards for General Schedule Positions. Specialized Experience: Applicants must have at least one full year (52 weeks) of specialized experience which is in or directly related to the line of work of this position. Specialized experience is demonstrated hands-on technical experience in ALL of the following: Planning, executing, and documenting proactive and iterative hypothesis-based hunts with minimal direction; Conducting hunt operations to detect and remove potentially malicious cyber actors from organizational IT environments; and Reviewing unstructured/structured application logs from custom applications. Desired, but Not Required: Applicants with one or more of the following information technology certifications are highly desired: Offensive Security Certified Professional (OSCP) GIAC Reverse Engineering Malware (GREM) GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Education This position does not require education to qualify. Additional Information The AO is an Equal Opportunity Employer.

DirectEmployers