About Beacon Systems, Inc
Beacon Systems, Inc, delivers Program Management, Science, Engineering, and Technology Solutions to Federal, Commercial State, and Local Agencies. We are a subsidiary of Radiant Digital Services. We have a vast portfolio of clients across the country. Our Technology support to many DoD Agencies, NASA, Voice of America, FDA, and State Agencies such as State of FL, RI, MS, ND, VA, and WV extends our delivery of solutions worldwide.
Role : Network Security Engineer
Location: Austin, TX
Duration: 06 Months
We are seeking a highly motivated and talented individual to join our cybersecurity team at the Texas Office of the Attorney General (TxOAG) as a Network Security Analyst. The Network Security Analyst is responsible for proactively identifying, investigating, and disrupting advanced cyber threats that evade traditional security controls. The role focuses on hypothesis-driven analysis, adversary behavior detection, and continuous improvement of threat detection capabilities.
Key Responsibilities
Proactively conduct threat hunting activities to identify malicious activity, advanced persistent threats, and indicators of compromise not detected by automated tools
Develop and execute hypothesis-driven hunts based on threat intelligence, adversary tactics, techniques, and procedures (TTPs), and organizational risk profiles
Analyze endpoint, network, identity, and cloud telemetry to detect anomalous or suspicious behavior
Investigate and validate potential security incidents, determine root cause, and assess scope and impact
Collaborate with incident response, SOC, and detection engineering teams to support containment, eradication, and recovery activities
Translate threat hunting findings into actionable detection logic, alerts, and analytics to improve security monitoring
Document hunting methodologies, findings, and recommendations in formal reports and knowledge repositories
Contribute to the development and tuning of security use cases, queries, and detection rules across SIEM, EDR, NDR, and cloud security platforms
Leverage threat intelligence sources to track emerging threats, attacker tools, and campaigns relevant to the organization
Support purple team activities, tabletop exercises, and continuous adversary simulation efforts
Maintain awareness of evolving attacker techniques and emerging cybersecurity threats
The above job description and requirements are general in nature and may be subject to change based on the specific needs and requirements of the organization and project.
Candidate Skills and Qualifications:
Minimum Requirements:
Candidates that do not meet or exceed the minimum stated requirements (skills/experience) will be displayed to customers but may not be chosen for this opportunity.
Required Skills:
8 Strong understanding of attacker tactics, techniques, and procedures.
8 Experience analyzing logs and telemetry from SIEM, EDR/XDR, network security, identity platforms, and cloud environments.
8 Proficiency in query languages and scripting used for threat hunting.
8 Solid knowledge of Windows, Linux, and cloud operating systems, including common attack vectors and persistence mechanisms.
8 Proven expertise in security considerations of cloud computing: They include data breaches, broken authentication, hacking, account hijacking, malicious insiders, third parties, APTs, data loss and DoS attacks.
8 Knowledge and understanding of threat analysis and assessment of potential and current information security risk/threats and designing solutions to mitigate those threats.
8 Knowledge and experience working with relevant National Institute of Standards and Technology (NIST) standards.
8 Familiarity with threat intelligence sources, malware analysis concepts, and digital forensics fundamentals.
8 Experience documenting investigations, creating hunt reports, and communicating technical findings to diverse audiences.
8 Strong analytical, problem-solving, and critical-thinking skills.
8 Ability to work independently while collaborating effectively within cross-functional cybersecurity teams.
8 Ability to resolve complex security issues in diverse and decentralized environments; to learn, communicate, and teach new information and security technologies; and to communicate effectively
8 Conduct forensic investigations on cyberattacks to determine how they occurred and how they can be prevented in the future.
8 Experience creating/reviewing/updating security policies and standards for the public/private/hybrid cloud contexts.
3 GSEC, CEH, CISA, CCSP
Preferred Skills:
3 Certification as an AWS Solutions Architect, Cloud Security Certification, and/or OpenStack Administrator Certification a plus. (Other cloud-related certification also a plus.)
3 Experience with Endpoint Detection and Response (i.e. EndGame, Crowdstrike, CyberReason), Detect and respond to alerts from end point detection response tools.
3 Experience with Email Threat Management (i.e. Proofpoint, MimeCast, Microsoft).
3 Experience with SIEM engineering design/management/analysts (i.e. Splunk, Rapid7, SumoLogic).
3 Experience with Data Loss Protection/Cloud Access Security Brokers (i.e. Symantec, Microsoft, Bitglass, Netskope).
3 Experience with Cloud Enterprise Network Security (i.e. Cisco Umbrella, Palo Alto, ZScaler).
Compensation for roles at Beacon Systems Inc depending on a wide array of factors including, but not limited to, the specific office location, role, skill set, and level of experience. As required by applicable law, BeaconGov provides reasonable range of compensation for this role.
Beacon Systems is dedicated to fostering an inclusive and diverse work environment. We ensure equal employment opportunities for all individuals, regardless of their race, color, religion, gender, national origin, age, disability, or any other legally protected characteristic. Our commitment to being an equal-opportunity employer extends across all aspects of employment, from recruitment and hiring to promotions and benefits. We firmly believe in treating all employees and applicants fairly, based on their qualifications, skills, and performance.