Raytheon contracted to US DHS Cybersecurity and Infrastructure Security Agency (CISA)Sr. Cybersecurity Threat Hunt Forensics Engineer
Apr. 2022Virginia, United States* Provide action in response to identified and analyses anomalous network activity, through client’s IPS or firewall or captured network traffic such as Palo Alto and Cisco vendors for industrial control systems (ICS), OT networks, SCADA networks, Federal agencies, host attacks, network security,. Assesses network topology and device configurations identifying critical security concerns, reviewing security policies and providing security best industry or federal practice recommendations and regulations. Working with Mitre ATT&CK framework with the analysis of the exploits and in the incident handling.
*Developing AWS Cloud breach scenarios using cloud penetration testing tools such as Caldera and PACU to do enumeration, emulation and scanning, user privilege escalation attacks, and are being used to create attack playbooks. These cyber-attack exercises are tested with and without a defense setup of Cloudtrail, Container scanning, GuardDuty, DevSecOps patterns, Terraform, AWS Shield, Snyk IaC scanning, AWS Web applications firewall (WAF) setup to see the results in Cloudwatch logs and OpenSearch. Cross-functional leadership and collaboration, Crowdstrike EDR and management of incidents and Threat Hunting, advance malware prevention and detection, cloud security management.
*Using AWS Clod infrastructure management orchestration tools such as CloudFormation for infrastructure resources and AWS Elastic Kubernetes Service (EKS) for application deployment. Mentor team members, team leadership, Give presentations on the AWS security and general services to technical groups such as security engineers, executive technical mangers, and stakeholders.
*Proactive Threat Hunting, remote and onsite incident response operations, using host and network-based cybersecurity analysis capabilities involving Splunk, ingesting data and transforming it with pipeline automation, evaluating security controls to see if match up to Zero Trust Maturity Model (ZTMM) & NIST 800-207.