Careers - MAD Security

MAD Security Careers

Come join a team of some of the brightest and most innovative security experts around!

For Employees:

MAD Security offers a very competitive compensation package that includes base salary, medical, 401k matching, bonuses (we like to reward you for your hard work), training on next generation security tools, and flexible time off.

For Trusted Partners (1099):

We are also looking for partners that we can work with that can augment our skills and add depth to our team. We frequently receive requests for work that is a little out of our lane or that we can’t take on due to full bookings, and in those cases we like to work with trusted partners to create win/win scenarios.


MAD Security Career Postings:

Cyber Hunt Analyst

Job Title
Cyber Hunt Analyst
Job ID
27055986
Location
Huntsville,  AL
Other Location
Description

The successful candidate will support the customer in cyber-threat hunting and associated investigations of systems developed and implemented to support the customer’s mission and the supply chain used to develop their products.  The candidate will be part of a team that will perform cyber-threat hunting with Defense Industrial Base suppliers to identify potential cyber-threat activity within their networks/systems.  The successful candidate will perform hands-on investigations that require critical thinking and a broad understanding of multiple technologies.  The incumbent will support development of presentations and reports to document findings, and will require good communication and interpersonal skills to convey findings in a tactful manner at the technical proficiency level of the audience.
 
Responsibilities include:
•             Assist in the development and execution of cyber threat-hunting tactics, techniques, and procedures (TTPs)
•             Serve as a data analysis expert for output from a wide variety of cyber assessment tools and Big Data Analytics
•             Assist in analysis tool development, configuration, implementation and use
•             Analyze cyber-threat intelligence (e.g. actors, tools, exploits, malware, etc.) and determine TTPs used by threat-actors
•             Analyze security events and data feeds for event detection, correlation from monitoring solutions, conduct triage and classify the output using automated systems for further investigation
•             Assist in the discovery of cyber vulnerabilities and the investigation of global cyber security incidents, as required
•             Develop cyber protection improvement recommendations that support the remediation and protection of systems
•             Analyze and report on cyber-threats based on assessment and all-source intelligence
•             Translate analytical findings into security “use cases” that can be implemented within available surveillance capabilities
•             Provide detailed and accurate technical reporting of analysis results in the form of PowerPoint presentations and/or Word documents, as well as oral briefings on complex technical subjects attuned to senior management, technical, or non-technical audiences
 
Position Requirements:
•             Practical knowledge of high-level scripting/programming language (e.g. Python, Pearl, PowerShell, etc.) to extract, de-obfuscate, or otherwise manipulate malware-related data
•             Proficient with forensic analysis tools and techniques to identify malware technical indicators of compromise and perform triage
•             Possess excellent oral and written communication skills and critical thinking abilities
•             Capable of working independently and within teams to solve complex problems
•             Able to work across multiple organizations, cultures and service providers to pull together actionable information and management information
•             Practical knowledge of Splunk policies, filters and rules to improve event analysis and data correlation 
•             Have 5+ years of penetration testing, incident response, malware analysis, reverse engineering, or other similar work experience
•             Knowledge of Windows and Unix/Linux Operating Systems
•             Ability to perform analysis of network traffic and protocols
•             Background or experience in digital forensics is a plus

Security Clearance: Require a current Secret clearance with an SSBI / Current Top Secret clearance with SCI eligibility preferred
Education and Experience: MA/MS in related field or 10 years of experience in a cyber-related field

Professional Certifications: Required to hold one or more current certifications equivalent to Offensive Security Certified Professional (OSCP), SANS GIAC Penetration Tester (GPEN), SANS GIAC Certified Incident Handler (GCIH), SANS GIAC Web Application Penetration Tester (GWAP), SANS GIAC Certified Intrusion Analyst (GCIA)

Annual Travel Requirements: 20% - 30%

Position Type Full-Time Day Shift

Equal Employment Opportunity Policy (EEO)

MAD Security and Insperity provide equal employment opportunities to all employees and applicants in all company facilities without regard to race, color, religious creed, sex, national origin, ancestry, citizenship status, pregnancy, childbirth, physical disability, mental and/or intellectual disability, age, military status, veteran status (including protected veterans), marital status, registered domestic partner or civil union status, familial status, gender (including sex stereotyping and gender identity or expression), medical condition (including, but not limited to, cancer related or HIV/AIDS related), genetic information, or sexual orientation in accordance with applicable federal, state and local laws.

Option 2: Create a New Profile