Yesterday
Secret
Mid Level Career (5+ yrs experience)
$150,000 and above
IT - Security
Port Hueneme, CA (On-Site/Office)
Blu Omega is looking for a Senior Information Security Analyst - Forensic to join our team. In this role, you will be conducting adversarial assessments and penetration testing to identify vulnerabilities and enhance system security. You will be responsible for developing comprehensive technical documentation to detail findings from penetration testing events, as well as preparing briefing materials for the CSPO. Additionally, you will assist in planning and executing adversarial (penetration) testing and provide recommendations for effective mitigation strategies.
This position requires an active DoD Secret clearance (or above) as a precondition of employment.
Candidates must be willing to work onsite five days per week in Port Hueneme, CA.
Responsibilities:
Assist in establishing and managing a Security Operations Center (SOC) for incident response and threat hunting.
Provide oversight and guidance to junior analysts, assisting in prioritization and milestone tracking.
Manage the SIEM platform, monitor security alerts, and coordinate vulnerability assessments.
Evaluate network structures, identify security risks, and recommend solutions based on best practices.
Analyze network traffic and system logs to identify malicious activity, vulnerabilities, and exploit methods.
Conduct forensic analysis on Windows/Linux clients, servers, and control operating systems.
Research and integrate new security tools, synthesize findings into technical and non-technical reports.
Qualifications:
5+ years of experience in security operations, with leadership in customer-facing roles.
Strong expertise in host/network forensics tools (e.g., MAGNET, EnCase, Sleuthkit, FTK).
In-depth knowledge of evidence handling, particularly in DoD environments.
Ability to collect artifacts to ensure optimal case outcomes.
Proficient in cyber-attack analysis, including understanding attack classifications, stages, and system vulnerabilities.
Extensive knowledge of network protocols (TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB) and tools such as Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, and Security Center.
Expertise in attack reconstruction using network traffic, integrating Threat Intelligence, and familiarity with the MITRE ATT&CK framework.
Ability to collaborate across multiple locations.
Nice to Haves:
Knowledge of Operational Technology (OT) and Industrial Control Systems (ICS).
Strong analytical and troubleshooting skills.
Proficient in MAGNET forensics software.
Experience developing expert content in Splunk Enterprise Security.
Knowledge of emerging threats and attack vectors to develop continuous monitoring rules.
Familiarity with tools like Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, and SCADA systems.
Ability to review logs and apply use cases to accelerate data model development.
Certifications:
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant certifications.
Other relevant certifications include DoD 8570 CSSP, IAT Level II, CHFI, CySA+, GIAC (e.g., GNFA, GCIA, GCIH).
Education:
College degree preferred, not required.
Cyber Security workforce standards under DoD 8140 should be met through education, experience, or certifications.
What Blu Omega Can Offer You:
Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more.
Results driven culture that embrace our core values
Rewarding work contributing to our Nation’s mission critical programs
Blu Omega is a Woman Owned Small Business Federal Technology services firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications.
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
This position requires an active DoD Secret clearance (or above) as a precondition of employment.
Candidates must be willing to work onsite five days per week in Port Hueneme, CA.
Responsibilities:
Assist in establishing and managing a Security Operations Center (SOC) for incident response and threat hunting.
Provide oversight and guidance to junior analysts, assisting in prioritization and milestone tracking.
Manage the SIEM platform, monitor security alerts, and coordinate vulnerability assessments.
Evaluate network structures, identify security risks, and recommend solutions based on best practices.
Analyze network traffic and system logs to identify malicious activity, vulnerabilities, and exploit methods.
Conduct forensic analysis on Windows/Linux clients, servers, and control operating systems.
Research and integrate new security tools, synthesize findings into technical and non-technical reports.
Qualifications:
5+ years of experience in security operations, with leadership in customer-facing roles.
Strong expertise in host/network forensics tools (e.g., MAGNET, EnCase, Sleuthkit, FTK).
In-depth knowledge of evidence handling, particularly in DoD environments.
Ability to collect artifacts to ensure optimal case outcomes.
Proficient in cyber-attack analysis, including understanding attack classifications, stages, and system vulnerabilities.
Extensive knowledge of network protocols (TCP/IP, ICMP, HTTP/S, DNS, SSH, SMTP, SMB) and tools such as Palo Alto, Elastic SIEM, Cribl, Splunk, VMware, and Security Center.
Expertise in attack reconstruction using network traffic, integrating Threat Intelligence, and familiarity with the MITRE ATT&CK framework.
Ability to collaborate across multiple locations.
Nice to Haves:
Knowledge of Operational Technology (OT) and Industrial Control Systems (ICS).
Strong analytical and troubleshooting skills.
Proficient in MAGNET forensics software.
Experience developing expert content in Splunk Enterprise Security.
Knowledge of emerging threats and attack vectors to develop continuous monitoring rules.
Familiarity with tools like Nessus, Endgame, CrowdStrike, Gray Noise, Shodan, and SCADA systems.
Ability to review logs and apply use cases to accelerate data model development.
Certifications:
Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant certifications.
Other relevant certifications include DoD 8570 CSSP, IAT Level II, CHFI, CySA+, GIAC (e.g., GNFA, GCIA, GCIH).
Education:
College degree preferred, not required.
Cyber Security workforce standards under DoD 8140 should be met through education, experience, or certifications.
What Blu Omega Can Offer You:
Competitive benefits including Health Insurance, 401K w/ match, Paid Time Off and more.
Results driven culture that embrace our core values
Rewarding work contributing to our Nation’s mission critical programs
Blu Omega is a Woman Owned Small Business Federal Technology services firm headquartered in Washington DC and supporting clients nationally. We provide Technology solutions for enterprise and government customers. Our team has a past performance in a diverse range of programs including those for Data Management, Cloud/Infrastructure, Software Development and Enterprise Applications.
An Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, or protected veteran status and will not be discriminated against on the basis of disability.
group id: 91121246