Detection Engineer

Analytics, Automation, Business intelligence, CBP, CHFI, CISSP, COM, Computer, Continuous integration, Cyber security, DHCP, DMA, Digital media, ECSA, Education, Email, EnCase, Engineering, Enterprise networks, FOCUS, Firewall, Forensic Toolkit, Forensics, GCFA, GCIA, GCIH, GIAC, IDS, Incident management, Information assurance, Information systems, Intrusion detection, Investigation, Linux, Malware analysis, Mathematics, Metrics, Microsoft Windows, Networking, OSCP, Operations, PASS, Penetration testing, Proxies, Python, QA, Research, Reverse engineering, SANS, SIEM, Science, Scripting, Security, Security analysis, Security clearance, Self motivated, Statistics, System security, Tier 3, VPN, Windows PowerShell, Wireless communication
Contract W2
Depends on Experience

Job Description

Our Ashburn VA based client is looking for a Detection Engineer. If you are qualified for this position. Please email me your updated resume in word format to



Work location: Ashburn VA



Detection Engineer

Primary Responsibilities

  • Identify gaps in malicious activity detection capabilities
  • Create new signatures / rules to improve detection of malicious activity
  • Test and tune existing signatures / rules to ensure low rate of false positives
  • Assist in playbook development for alert triage and Incident Response
  • Define and implement alert and threat detection metrics, statistics, and analytics
  • Recommend new tools/technologies to improve network visibility
  • Support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering
  • Author and maintain scripts for threat detection and automation


Basic Qualifications

The Cyber Threat Detection Engineer SME shall have the following qualifications: 

  • In-depth knowledge of Firewalls/Proxies/Intrusion Detection Systems/ Domain Name Servers/DHCP/VPN and other network technologies and tools
  • Experience updating, maintaining, and creating IDS variables within a complex enterprise network
  • Expert in creating, modifying, tuning IDS signatures/SIEM Correlation Searches/yara rules  and/or other detection signatures
  • Familiarity with disk based forensic methodologies, Windows, and Linux forensic artifacts
  • Experience with Endpoint Detection and Response (EDR) tools such as Carbon Black, Tanium, Crowdstrike, etc
  • Able to create, modify, update, and maintain Python and Powershell scripts that enhance endpoint detection capabilities
  • In-depth knowledge of attacker tactics, techniques, and procedures
  • Author, test, and maintain automation scripts within SOAR platform


The candidate must currently possess a Secret Clearance.  In addition to clearance requirement, all CBP personnel must have a current or be able to favorably pass a 5 year background investigation (BI).  


Required Education/Experience

BS degree in Science, Technology, Engineering, Math or related field and 8 years of prior relevant experience with a focus on cyber security or Masters with 6 years of prior relevant experience.

Should have 5 years of experience serving as a digital media analyst or as a computer forensic analyst.

Ability to work independently with minimal direction; self-starter/self-motivated


Must Have One of the Following J3 Certifications

Tier 3 DMA:

GCIH – Incident Handler

GCFA – Forensic Analyst

GCFE – Forensic Examiner

GREM – Reverse Engineering Malware

GISF – Security Fundamentals

GXPN – Exploit Researcher and Advanced Penetration Tester

OSCP (Certified Professional)

OSCE (Certified Expert)

OSWP (Wireless Professional)

OSEE (Exploitation Expert)

CCFP – Certified Cyber Forensics Professional

CISSP – Certified Information Systems Security

CHFI – Computer Hacking Forensic Investigator

LPT – Licensed Penetration Tester

ECSA – EC-Council Certified Security Analyst


Windows Forensic Examinations – FTK WFE-FTK

Computer Incident Responders Course - CIRC

Windows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CI

Forensics and Intrusions in a Windows Environment -FIWE


Preferred Qualifications

One of the following certifications:

SANS Global Information Assurance Certification (GIAC) Certified Intrusion Analyst (GCIA) 

SANS Global Information Assurance Certification (GIAC) Certified Forensic Analyst (GCFA)

SANS Global Information Assurance Certification (GIAC) Certified Network Forensic Analyst (GNFA)

Certified Information System Security Professional (CISSP)

Dice Id : baseone
Position Id : 6932168
Originally Posted : 5 months ago
Have a Job? Post it

Similar Positions

Tier 3 Cyber Network Defense Analyst
  • Base One Technologies
  • Ashburn, VA, USA
Penetration Tester
  • Base One Technologies
  • Ashburn, VA, USA
Data Security Analyst
  • ObjectWin Technology Inc
  • Sterling, VA, USA
Tier 2 SOC Analysts
  • Base One Technologies
  • Washington, DC, USA
Network Security Engineer
  • Global Conductor
  • Lynchburg, VA, USA
IT Security Engineer
  • Eliassen Group
  • Charlotte, NC, USA
Ops Watch- Incident Response Analyst
  • Cerner Corporation
  • North Charleston, SC, USA
Senior Cyber Security Analyst
  • Software Resources, Inc.
  • Orlando, FL, USA
Cyber Network Defense Analyst
  • Base One Technologies
  • John C. Stennis Space Center, MS, USA
Cyber Incident Response Analyst
  • Base One Technologies
  • John C. Stennis Space Center, MS, USA