At Shire, we are proud and grateful to employ military veterans and thank them for their contributions to our company and our country. See where your military experience can play a role at Shire by using our military skills translator job search tool below:
NET ESolutions Corporatio Information Security Engineer - Digital Forensics in Rockville, Maryland
NET ESOLUTIONS CORPORATION (NETE), an NTT DATA Services Company, drives global advancements in health through technological innovation in digital services, application development, clinical/bioinformatics, advanced data analytics, cloud, and cybersecurity. NETE offers a collaborative working environment where growth is encouraged and nurtured.
NETE is seeking a highly motivated, flexible, organized, and detail oriented Information Security Engineer - Digital Forensics to join our dynamic team at Rockville, MD. If you want to learn, grow, and help then this is the job for you. We support a project/customer that "seeks to better understand, treat, and ultimately prevent infectious, immunologic, and allergic disease seeks fundamental knowledge about the nature and behavior of living systems and the application of that knowledge to enhance health, lengthen life, and reduce illness and disability.” What you do matters and has significant impact on the medical and scientific communities we serve. Your work here really matters and has real impact.
NETE is seeking an information security engineer who will be a key member of a consulting team providing advice and support, to federal agencies, in the areas of Information Security.
This role will be primarily responsible for conducting digital forensic operations and supporting Threat Detection efforts and different phases of Computer Security Incident Response (CSIR).
Conduct digital forensic analysis through, evidence acquisition, evidence analysis, email forensics, registry analysis, user forensic analysis, data carving, artifact analysis, memory analysis, file analysis, log analysis, browser analysis, timeline analysis, file system analysis, malware analysis, anti-forensic detection analysis, social media forensic analysis among others.
Gather and analyze information for defining requirements, specifications and issues to support the development of new policies, standards, and procedures or update existing ones.
Work with a team of diverse individuals and cross-functional teams to solve unique and complex problems with broad impact on the business.
Provide clear updates to management on security incidents; Investigate, document, and report on information security issues and emerging trends
Write and publish cyber defense recommendations, reports, and white papers on incident findings to appropriate constituencies.
Participate in industry task forces and working groups where appropriate to understand current and future threats and monitor security-related websites (US-CERT, SANS Internet Storm Center, etc.) and mailing lists (DHS Infrastructure, BugTraq, etc.) to stay up to date on current attacks and trends.
BA or BS degree in MIS, CS, or related cybersecurity discipline or equivalent experience.
Industry standards such as EnCE or related GIAC (preferred but not required).
Minimum 4 years’ experience in Information Security is required along with excellent knowledge of at least 3 of the following:
Law enforcement evidence seizure process
Malware analysis or reverse engineering
Carving, compiling and analyzing security incident related artifacts
Excellent attention to detail and analytical skills required.
Overall Risk Management processes (e.g., methods for assessing, mitigating and accepting risks).
Cybersecurity principles, security models, organizational requirements (w.r.t. confidentiality, integrity, availability, authentication, non-repudiation), cyber threats, risks and vulnerabilities, cryptography and cryptographic key management concepts, host/network access control mechanisms (e.g., ACLs), network access, identity, & access management (e.g., PKIs), Computer networking concepts and protocols, and network security methodologies.
Knowledge of cyber threats and vulnerabilities; Ethical hacking principles, general attack stages; Specific operational impacts of cybersecurity lapses; programming language structures and logic.
File hash\signature analysis, anti-forensic detection techniques, and malware analysis.
Able to communicate, verbally and in writing, complex technical issues with simplicity & clarity.
Able to exercise discretion and maintain confidentiality.
Proficient in reporting and answering analytical questions during investigations.
Applicants selected will be subject to a Public Trust background security investigation and may need to meet eligibility requirements for access to sensitive information. US Citizens or Permanent Residents only.
Paid Time Off (PTO)
9 Paid Federal holidays
Various wellness programs
Free parking at corporate offices
Employee Referral Bonus Program (ERBP)
Vision coverage through UHC national network
Dental coverage through UHC national network
401(K) with significant company match & no vesting period
Short and Long-Term Disability coverage (paid by the company)
Competitive salaries with opportunity for performance bonuses
Discount plan for pet care, legal services, & identify theft protection
Basic Life and AD&D coverage (paid by the company; option to purchase additional coverage)
Medical coverage through UHC national network (option to choose between 3 available plans)
Flexible Spending Accounts:
Parking Reimbursement Account (PRK)
Dependent Care Assistant Program (DCAP)
Transportation Reimbursement Account (TRN)
NETE is a multi-award winning company as well as offers a collaborative working environment where growth is encouraged and nurtured. In addition, we offer competitive salaries that may include performance bonuses; and a comprehensive benefits package.
NETE uses E-Verify to validate all new hires' ability to legally work in the United States.
Disclaimer: The above description is intended to describe the general nature of work and level of effort being performed by individual’s assigned to this position or job description. This is not to be construed as a complete or exhaustive list of all skills, responsibilities, duties, and/or assignments required. Individuals may be required to perform duties outside of their position, job description, or responsibilities as needed.