hackajob is partnering with Lumen Technologies to fill this position. Create a profile to be automatically considered for this role—and others that match your experience.
About Lumen
Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re invested in providing the flexibility you need to thrive and deliver lasting impact. Apply now to continue digitally connecting the world and shaping the future.
Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen’s unique visibility to hunt and scale discovery of evolving malicious threats as well as provide guidance on mitigations on large networks. Our global visibility into one of the world’s largest and most interconnected IP backbones as well as our computing cluster present exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years.
This position will work alongside Black Lotus Labs advanced security researchers, data engineers, malware reverse engineers, data scientists, and our customers to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots.
This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening with requirements for in person collaboration at the customer site as needed in Annapolis Junction, Maryland.
This position requires an active TS/SCI security clearance w/ CI Poly.
This is a remote position open to candidates based in Maryland or Virginia.
-Research latest threat attacker tools, techniques, and procedures (TTPs) with a goal of automating detection.
-Work with cyber operators, when requested, to conduct in-depth investigations on cyber threat activity and provide mitigation guidance.
-Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana
-Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups.
-Support customer RFIs on incidents and emerging threats.
Desired candidates will have a strong background exhibiting:
-Candidates must effectively communicate complex domain-specific concepts, ensuring clarity for both technical and non-technical audiences.
-Familiarity with adversary capabilities, infrastructure, and techniques that can be applied in collaboration with supporting teams and partners to discover, track, and defend against the adversaries aggression towards customer networks.
-Experience using OSINT methods for investigation, including discovering novel threats in malware repositories.
-Scripting experience with Python and familiarity with distributed computing.
-Extensive experience hunting threat actors and developing algorithms and techniques to identify new threats from large data sets.
-Deep knowledge of network-based threats and identifying behaviors without attack payloads.
-Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages.
-User-level experience in a Unix-based environment.
-Familiarity with extracting data through SQL.
-Strong writing skills to assist in sharing our knowledge with the public.
-Demonstrable knowledge of several of the following areas: cybersecurity concepts, network protocols, firewalls, IDS/IPS systems, cyber threat hunting, malware analysis tools and techniques, cyber threat intelligence, common threat actor TTPs, application security concepts, cloud security fundamentals.
Well experienced candidates may also have the following skills:
-Previous work experience with Department of Defense (DoD), Intelligence Community, or other government agencies (e.g., DHS, DOE, VA, etc.)
-Experience with Spark and distributed computing
-Experience developing automation and analysis in Python-based environments.
-Ability to work with others in providing direction and assisting in learning new topics.
Preferred:
-Proficient in analyzing NetFlow data to identify unusual patterns and potential security threats.
-Interest in conducting trend analysis to uncover patterns and emerging threats, enabling proactive defense strategies.
hackajob is partnering with Lumen Technologies to fill this position. Create a profile to be automatically considered for this role—and others that match your experience.
Level up the hackajob way. Verify your skills, learn brand new ones and test your ability with Pathways, our learning and development platform.