Westfield Network Program
Ready to join a dedicated team of experts supporting a program which provides a broad range of enterprise network services? We’re connecting cleared professionals to challenging opportunities and we want your expertise as a part of our future.
Job Description: Supports cybersecurity initiatives through both predictive and reactive analysis, articulating emerging trends to leadership and staff.
Coordinates resources during enterprise incident response efforts, driving incidents to timely and complete resolution.
Performs network traffic analysis utilizing raw packet data, net flow, IDS, and custom sensor output as it pertains to the cybersecurity of communications networks.
Reviews threat data from various sources and develops custom signatures for Open Source IDS or other custom detection capabilities.
Correlates actionable security events from various sources including Security Event Information Management (SEIM) system data and develops unique correlation techniques.
Utilizes understanding of attack signatures, tactics, techniques and procedures associated with advanced threats.
Develops analytical products fusing enterprise and all- source intelligence. Be able to conduct malware analysis of attacker tools providing indicators for enterprise defensive measures, and reverse engineer attacker-encoding protocols. Interfaces with external entities including law enforcement organizations, intelligence community organizations and other government agencies such as the Department of Defense.
Candidate will provide CND reports, trends, responses, mitigations, analysis, and information dissemination.
Prerequisites: / Qualifications: Must be able to fulfill requirements for an Information Assurance Management (IAM) Level II position, to include at least (5) five years of CND experience. Candidate must have experience supporting CND or related teams. Candidate must have experience working CND duties (e.g., Protect, Defend, Respond, and Sustain). Candidate must have experience working with DoD / Government Leaders at all levels. Candidate must have strong communication skills (both written and verbal).
Candidate should have UNIX Administrative skills. Candidate should have Command Line Scripting skills (i.e. PERL, python, shell scripting) to automate analysis task. Knowledge of hacker tactics, techniques, and procedures (TTP). Be able to conduct malware analysis. Demonstrated hands on experience with various static and dynamic malware analysis tools Knowledge of advanced threat actor tactics, techniques and procedures (TTP) Understanding of software exploits. Ability to analyze packed and obfuscated code. Comprehensive understanding of common Windows APIs and ability to analyze shellcode. Experience with Network Devices and Client/Server configurations as required. Candidate should be familiar with current DoD and Intelligence Community (IC) directive, Instruction, Policies and Guidance documents.
The candidate should have experience in the following areas:
Education: Bachelor’s in Computer Science (Information Management, Computer Information systems (CIS), or five (5) years’ of practical experience in the IS environment w/a minimum of four (4) years direct IA experience. The CISSP CAP, GSLC, CASP, or CISM is required.
AT&T a good place to be
I believe in AT&T and know they are at the edge of technology. The company believes in their people and offers all kinds of training to enable us to take on new jobs and to stay at the front of technology. The software defined network which we are building is the newest technology and AT&T has been involved since early 2000s. You have a great deal of autonomy at AT&T as long as you get the job done. You have the ability to do different jobs and to be challenged at all times.
I really have little negative to say about AT&T I have worked here for 35 years on March 23rd of 2016.Current Employee - PROFESSIONAL-NETWORK DESIGN ENGINEER+
- One Star Rating
- Two Star Rating
- Three Star Rating
- Four Star Rating
This is the life – the #LifeAtATT, that is. We’re creating what’s next and having a blast doing it. You’re looking for proof? Well, see for yourself.