Job Openings
Network Security Researcher (Early Career)
About the job Network Security Researcher (Early Career)
Responsibilities
- As part of a project team, implement architectures to simulate and/or emulate portions of various network architectures in a lab-based environment for troubleshooting and root cause analysis of misconfigurations and anomalous behaviors.
- Support analysis and result validation of the detection techniques and mitigations of anomalous behaviors.
- Research techniques used by Advanced Persistent Threats (APT) that would enable movement through, Command and Control (C2) of, and data exfiltration on a targeted network.
- Assist in determining which adversarial techniques network security controls and policies would block.
- Support simulating remaining techniques in a lab and collect data to help develop detection approaches.
- Research emerging trends in networking technology such as Software Defined Networking (SDN) and Network Function Virtualization (NFV).
- Design and develop experiments to analyze the potential impacts these technologies would have on networks and document the results.
- Assist in the development of APT detection approaches using rule-based and Machine Learning (ML) methodologies.
- Provide informal technical briefings on testing or experimental results to team members.
Key Qualifications
- Bachelor's degree in Computer Science or a related field and networking experience.
- Hands on experience with designing and implementing network designs with Cisco, Juniper, and Palo-Alto equipment.
- Familiarity with APT techniques.
- Understanding of networking and security concepts (e.g., TCP/IP stack, routing, firewalls, intrusion detection systems, intrusion prevention systems).
- Familiarity with IP networking concepts (e.g., Quality of Service) and virtual private networks.
- Ability to capture and analyze large amounts of network traffic.
- Ability to communicate technical concepts to teammates.
- Ability to obtain and maintain a Top Secret security clearance
- Travel may be a frequent as two weeks every two months.
Preferred Qualifications
- Experience with Linux, Microsoft Windows desktop and Server, as well as virtualization environments like VMware ESXi/vSphere.
- Familiarity with data science techniques.
- Hands on experience with packet capture utilities like tcp dump and Wire Shark as well as Network Intrusion Detection (NIDs) like Snort, Suricata, and Zeek.
- Familiarity with Python 3.x and Python libraries for machine learning such as TensorFlow and Keras.
- Familiarity with C11 and C++ 11 or later.
- Experience with behavioral models like MITREs ATT&CK, Lockheed Martins Cyber Kill Chain that describe Advanced Persistent Threats (APT) tactics and techniques.