Agile Defense is hiring a
Remote Cyber Defense Analyst
\nAt Agile Defense we know that action defines the outcome and new challenges require new solutions. Thatโs why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.\n\n\nOur vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agilityโleveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nationโs vital interests.\n\n\nJob Title: Cyber Defense Analyst (Junior)\nLocation: Must be local to the Washington D.C., USA. Role is performed remotely, but candidate maybe called onsite as needed\nClearance Level: Active - Public Trust\nRequired Certification(s): \nยท An industry technical certification such as Security + and above\n\n\nSUMMARY: Agile Defense Company is currently seeking a talented and ambitious self-starting, Junior Cyber Defense Analyst for a challenging position supporting one of our premier clients who conducts 24/7 operations to secure their enterprise environment. This is a unique opportunity for the right candidate to embed themselves into the next generation of operational environments which is now taking place across the US government and commercial sectors.\nThe existing team is a multi-faceted interdisciplinary set of experts with ever-increasing prowess in this unique atmosphere. Our security operations project is aimed at establishing innovative techniques for a comprehensive, cloud-first network enclave defense, identifying the emerging threats, and detecting malicious activity using advanced toolsets provided in the Microsoft cloud security ecosystem. The ideal candidate will have hands-on experience as a Cyber Defense analyst performing Incident Response and Intrusion Detection on a large operational network, specifically, utilizing the Microsoft Sentinel SIEM and related security portals.\n\n\n Schedule: Shift Schedule:\nยท Shift Schedule: 6:30 PM โ 4:30 AM ET (Sunday โ Wednesday) \nยท Shift Schedule: 6:30 PM โ 4:30 AM ET (Wednesday โ Saturday) \nยท Shift Schedule: 5 AM โ 3 PM ET (Saturday โ Tuesday) \n \nLocation:\nยท Must be local to the Washington D.C., USA. Role is performed remotely, but candidate maybe called onsite as needed.\n\n\nJOB DUTIES AND RESPONSIBILITIES:\nยท The candidate will monitor and analyze network traffic utilizing traditional network security toolsets, sign-ins, application endpoints and data lakes for security events, reporting any findings to Level II analysts and the Cyber Defense Leads. The candidate will perform incident response to investigate and resolve security incidents which present themselves as alarms and those incidents which are a product of proactive sensor strategies and investigations. \nยท The candidate will be able to determine between false and true positives events, prioritizing them appropriately and ferrying them through the approved process from beginning to end. \nยท Additionally, the candidate will perform, or review, root cause analysis efforts following incident recovery. The candidate will compose security alert notifications and other communications on behalf of the Cyber Fusion Center.\nยท In addition, the candidate will remain up to date with current vulnerabilities, attacks, and countermeasures and develop follow-up action plans to resolve reportable issues and communicate with the other technologists to address security threats and incidents. \nยท Also, the candidate will continually develop new use cases for automation and tuning of security tools, define and create privacy and security reportable issues metrics and reports. \nยท The candidate will need to contribute to security strategy and security posture by identifying security gaps, evaluating and implementing enhancements. \nยท The ideal candidate will possess a strong technical understanding of log and monitoring management systems, security event monitoring systems, network-based and host-based intrusion detection systems, security system technologies, malware detection and enterprise-level antivirus solutions/systems, VPN technologies and encryptions standards.\n\n\nQUALIFICATIONS:\nRequired Certifications:\nยท An industry technical certification such as Security + and above.\nEducation, Background, and Years of Experience:\nยท Bachelor's degree preferred but not required.\n\n\nADDITIONAL SKILLS & QUALIFICATIONS:\n\n\nRequired Skills:\nยท One to two (1-4) years of experience in network defense environments\nยท An industry technical certification such as Security + and above.\nยท 1 - 3 years of experience with tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers\nยท Experience with deployment and documentation of enterprise project management and change management processes\nยท Ability to identify solutions to potential network issues/embrace network simplification and strengthened security\nยท Ability to conduct event triage and analysis and incident investigation\nยท Write threat reports and incident reports\nยท Read and ingest various govt. regulations for application to agency environment\nPreferred Skills:\nยท Understanding of command line scripting and implementation (e.g., Python, PowerShell)\nยท Ability to write latest content/searches/scripts (e.g., Create dashboards, Sentinel alerts, Python scripts, PowerShell scripts)\nยท Familiarity with differences in on-prem OPSEC in relation to cloud-based security\nยท Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS)\nยท Ability to perform NetFlow / packet capture (PCAP) analysis\nยท Experience with cyber threat hunting\n\n\nWORKING CONDITIONS:\n\n\nStrength Demands:\nยท Sedentary โ 10 lbs. Maximum lifting, occasional lift/carry of small articles. Some occasional walking or standing may be required. Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.\nPhysical Requirements:\nยท Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See\n \n\n\n\n\n\nEmployees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.\n\n\nHappy - Be Infectious.\nHappiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.\n\n\nHelpful - Be Supportive.\nBeing helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.\n\n\nHonest - Be Trustworthy.\nHonesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.\n\n\nHumble - Be Grounded.\nSuccess is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.\n\n\nHungry - Be Eager.\nOur hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.\n\n\nHustle - Be Driven.\nHustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.\n\n\nEqual Opportunity Employer/Protected Veterans/Individuals with Disabilities\nThe contractor will not discharge or in any other manner discriminate against employees or applicants because they have inquired about, discussed, or disclosed their own pay or the pay of another employee or applicant. However, employees who have access to the compensation information of other employees or applicants as a part of their essential job functions cannot disclose the pay of other employees or applicants to individuals who do not otherwise have access to compensation information, unless the disclosure is (a) in response to a formal complaint or charge, (b) in furtherance of an investigation, proceeding, hearing, or action, including an investigation conducted by the employer, or (c) consistent with the contractorโs legal duty to furnish information. 41 CFR 60-1.35(c) \n\n#Salary and compensation\n
No salary data published by company so we estimated salary based on similar jobs related to Python and Cloud jobs that are similar:\n\n
$62,500 — $112,500/year\n
\n\n#Benefits\n
๐ฐ 401(k)\n\n๐ Distributed team\n\nโฐ Async\n\n๐ค Vision insurance\n\n๐ฆท Dental insurance\n\n๐ Medical insurance\n\n๐ Unlimited vacation\n\n๐ Paid time off\n\n๐ 4 day workweek\n\n๐ฐ 401k matching\n\n๐ Company retreats\n\n๐ฌ Coworking budget\n\n๐ Learning budget\n\n๐ช Free gym membership\n\n๐ง Mental wellness budget\n\n๐ฅ Home office budget\n\n๐ฅง Pay in crypto\n\n๐ฅธ Pseudonymous\n\n๐ฐ Profit sharing\n\n๐ฐ Equity compensation\n\nโฌ๏ธ No whiteboard interview\n\n๐ No monitoring system\n\n๐ซ No politics at work\n\n๐
We hire old (and young)\n\n
\n\n#Location\nWashington, D.C