About Lumen
Lumen connects the world. We are igniting business growth by connecting people, data and applications – quickly, securely, and effortlessly. Together, we are building a culture and company from the people up – committed to teamwork, trust and transparency. People power progress. We’re invested in providing the flexibility you need to thrive and deliver lasting impact. Apply now to continue digitally connecting the world and shaping the future.
Legal Statement
In any materials you submit, you may redact or remove age-identifying information such as age, date of birth, or dates of school attendance or graduation. You will not be penalized for redacting or removing this information.
The Role
Black Lotus Labs has an opening for a Senior Lead Security Engineer that will leverage Lumen’s unique visibility to hunt and scale discovery of evolving malicious threats as well as provide guidance on mitigations on large networks. Our global visibility into one of the world’s largest and most interconnected IP backbones as well as our computing cluster present exciting opportunities to integrate machine learning and graph analytic techniques as we find new ways to hunt for threats across the internet. Black Lotus Labs has detected and disrupted key evolving threats at an internet scale for years.
This position will work alongside Black Lotus Labs advanced security researchers, data engineers, malware reverse engineers, data scientists, and our customers to tackle evolving threats accelerated by technologies like our Hadoop ecosystem (HBase, HDFS, Spark, Kafka, AirFlow), Elasticsearch and Redis clusters, Docker using Docker Swarm, malware environment, and a network of honeypots.
This is a close-knit, experienced, amazingly smart team that you can be a part of and help build out. This is a remote/work-from-home opening with requirements for in person collaboration at the customer site as needed in Annapolis Junction, Maryland.
This position requires an active TS/SCI security clearance.
The Main Responsibilities
• Research latest threat attacker tools, techniques, and procedures (TTPs) with a goal of automating detection.
• Analyze attacks and use forensic data and OSINT methods for investigation and development of network signatures.
• Work with cyber operators, when requested, to conduct in-depth investigations on cyber incidents and provide mitigation guidance.
• Automate investigations through Python scripting and data analysis using visualization in Jupyter Notebooks and Grafana
• Build and maintain trust relationships with other intelligence teams, law enforcement, and other outside groups.
• Support customer RFIs on incidents and emerging threats.
What We Look For in a Candidate
Desired candidates will have a strong background exhibiting:
• Bachelor’s Degree in Cybersecurity, Computer Science, a related field, or 10yrs equivalent experience
• Familiarity with adversary capabilities, infrastructure, and techniques that can be applied in collaboration with supporting teams and partners to discover, track, and defend against the adversaries aggression towards customer networks.
• Experience using OSINT methods for investigation, including discovering novel threats in malware repositories.
• Scripting experience with Python and familiarity with distributed computing.
• Extensive experience hunting threat actors and developing algorithms and techniques to identify new threats from large data sets.
• Deep knowledge of network-based threats and identifying behaviors without attack payloads.
• Strong analytical thinking and ability to quickly pick up new methods, tools and programming languages.
• User-level experience in a Unix-based environment.
Well experienced candidates may also have the following skills:
• Previous work experience with Department of Defense (DoD), Intelligence Community, or other government agencies (e.g., DHS, DOE, VA, etc.)
• Experience with Spark and distributed computing
• Experience developing automation and analysis in Python-based environments.
• Understanding of static or dynamic analysis of malware.
• Experience with operational security including SOC, incident response, malware analysis, or IDS/IPS analysis.
Preferred:
• Proficient in analyzing NetFlow data to identify unusual patterns and potential security threats.
• Interest in conducting trend analysis to uncover patterns and emerging threats, enabling proactive defense strategies.
Compensation
The starting salary for this role differs based on the employee’s primary work location. Employees typically do not start at the top of the range, though compensation depends on each individual’s qualifications.
Location Based Pay Ranges
$111480 – $167211 in these states: AR, ID, KY, LA, ME, MS, NE, SC, and SD.
$117340 – $176013in these states: AZ, AL, FL, GA, IN, IA, KS, MO, MT, NM, ND, OH, OK, PA, TN, UT, VT, WV, WI, and WY.
$123210 – $184815 in these states: CO, HI, MI, MN, NV, NH, NC, OR, and RI.
$129080 – $193617 in these states: AK, CA, CT, DE, DC, IL, MD, MA, NJ, NY, TX, VA, and WA.
As with the pay range variety that’s based on the region of a country, specific offers are determined by various factors such as experience, education, skills, certifications and other business needs.
Requisition #: 334849
Background Screening
If you are selected for a position, there will be a background screen, which may include checks for criminal records and/or motor vehicle reports and/or drug screening, depending on the position requirements. For more information on these checks, please refer to the Post Offer section of our FAQ page. Job-related concerns identified during the background screening may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis.
Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records.
Equal Employment Opportunities
We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, gender expression, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training.
Disclaimer
The job responsibilities described above indicate the general nature and level of work performed by employees within this classification. It is not intended to include a comprehensive inventory of all duties and responsibilities for this job. Job duties and responsibilities are subject to change based on evolving business needs and conditions.
Salary Range
Salary Min :
111480
Salary Max :
193617
This information reflects the base salary pay range for this job based on current national market data. Ranges may vary based on the job’s location. We offer competitive pay that varies based on individual experience, qualifications and other relevant factors. We encourage you to apply to positions that you are interested in and for which you believe you are qualified. To learn more, you are welcome to discuss with us as you move through the selection process.
Please be advised that Lumen does not require any form of payment from job applicants during the recruitment process. All legitimate job openings will be posted on our official website or communicated through official company email addresses. If you encounter any job offers that request payment in exchange for employment at Lumen, they are not for employment with us, but may relate to another company with a similar name.
Application Deadline
11/21/2024
Tagged as: Intelligence analyst