Title: Cyber Threat Hunt Analyst
Location: McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation’s toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don’t look any further than Cornerstone Defense.
Benefits Overview:
Cornerstone Defense offers a very comprehensive benefits package including, but not limited to: Medical, Dental and Vision Plans * Generous PTO Policy * 401(k) * HSA and FSA options * Life and Disability Insurance * Tuition Reimbursement and Training * Perks at Work Discount Program * Referral Program * Leads Generation Program * CollegeAmerica 529 * Fitness Reimbursement Program * Travel Assistance * Norton Lifelock Benefit Solutions * Life Planning Financial & Legal Services *
Seeking a Cyber Threat Hunt Analyst to join our Cyber Security Operations Center (CSOC) in McLean, VA. The ideal candidate will have a deep understanding of cyber threat hunting, advanced persistent threats (APTs), and the latest tactics, techniques, and procedures (TTPs) used by adversaries. Join us and play a vital role in our nation’s security by helping to enhance our security posture. Responsibilities include but are not limited to: Conduct threat hunting activities to detect advanced threats that evade traditional security solutions and continuously monitor and analyze threat intelligence sources to stay informed about emerging threats. Search for signs of malicious activity in our network and systems. Develop and implement new and innovative threat detection techniques and strategies. Analyze large datasets to identify patterns and anomalies indicative of malicious activities. Collaborate with other CSOC team members and stakeholders to respond to and investigate security incidents. Provide detailed reports and briefings on threat hunting activities and findings to senior management. Develop and maintain threat hunting playbooks, processes, and procedures. Perform in-depth forensic analysis to understand the nature and impact of threats. Participate in the development and refinement of security monitoring and incident response tools and processes.
Minimum Qualifications:
Preferred Qualifications:
Front End Software Developer
McLean, VA
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation’s toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don’t look any further than Cornerstone Defense.
Benefits Overview:
Cornerstone Defense offers a very comprehensive benefits package including, but not limited to: Medical, Dental and Vision Plans * Generous PTO Policy * 401(k) * HSA and FSA options * Life and Disability Insurance * Tuition Reimbursement and Training * Perks at Work Discount Program * Referral Program * Leads Generation Program * CollegeAmerica 529 * Fitness Reimbursement Program * Travel Assistance * Norton Lifelock Benefit Solutions * Life Planning Financial & Legal Services *
Front End Software Developer to support and All Source Data Modeling and Analysis team. Provide Front End Developer support to deliver a prototype application frontend Interface utilizing JavaScript, Angular, and a containerized (Docker and/or Kubernetes is preferred), cloud (AWS) development platform, Elasticsearch integration, and AWS tools. The application supports integrations that tie into other applications that support AI models on the backend.
1. JavaScript 2. Angular 3. AWS platform and development tools 4. Containerization (preferably Docker and/or Kubernetes) 5. ElasticSearch 6. Developing and integrating APIs
1. AI/ML 2. AI modeling with LLMs 3. Educational or practical experience in a STEM (Science, Technology, Engineering or Mathematics) field.
Title: Technical Targeting Officer
Location: McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation’s toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don’t look any further than Cornerstone Defense.
Required Skills:
Desired Skills:
Title: Cyber Security Analyst
Location: McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation’s toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don’t look any further than Cornerstone Defense.
Responsibilities include, but are not limited to:
Provide strategic and tactical direction to cyber hunters and leadership based on trends and actionable intelligence related to threat capabilities
Coordinate hunt activities between various internal and external hunt groups
Construct and exploit threat intelligence to detect, respond, and defeat advanced persistent threats (APTs)
Fully analyze network and host activity in successful and unsuccessful intrusions by advanced attackers
Build fly-away kits utilizing an agile approach to identify the appropriate tools and technologies necessary to conduct hunt missions
Conduct advanced threat hunt operations using known adversary tactics, techniques and procedures as well as indicators of attack in order to detect adversaries with persistent access to the enterprise
Create and add custom signatures, to mitigate highly dynamic threats to the enterprise using the latest threat information obtained from multiple sources. Perform malware analysis on samples obtained during an investigation or hunt operation to create custom signatures
Develop and produce reports on all activities and incidents to help maintain day to day status, develop and report on trends, and provide focus and situational awareness on all issues
Piece together intrusion campaigns, threat actors, and nation-state organizations
Manage, share, and receive intelligence on APT adversary groups
Generate intelligence from their own data sources and share it accordingly
Identify, extract, and leverage intelligence from APT intrusions
Expand upon existing intelligence to build profiles of adversary groups
Leverage intelligence to better defend against and respond to future intrusions
Correlate data from intrusion detection and prevention systems with data from other sources such as firewall, web server, and DNS logs
Notify the management team of significant changes in the security threat against the government networks in a timely manner and in writing via established reporting methods
Coordinate with appropriate organizations within the intelligence community regarding possible security incidents. Conduct intra-office research to evaluate events as necessary, maintain the current list of coordination points of contact.
Review assembled data with firewall administrators, engineering, system administrators and other appropriate groups to determine the risk of a given event
Maintain knowledge of the current security threat level by monitoring related Internet postings, Intelligence reports, and other related documents as necessary
Required Qualifications:
2+ years of experience in Computer Science, Cyber Security, Security Engineering or Network Engineering, including cyber security issues and operations, computer incident response, systems architecture, data management
Experience with working nation state intrusion sets
Experience with and expert level proficiency in one or more of the following disciplines:
Windows and/or Linux operating systems
Network forensics
Expertise at enterprise scale:
SysMon or EDR solutions for host-based Cyber Threat Hunting, or
Netflow/pcap or NDR solutions for network-oriented Cyber Threat Hunting
Malware analysis/reverse engineering
Exploit development
On-net pursuit/response
Incident response, forensics, or threat hunting in AWS or Azure
Knowledge of the following classes of enterprise cyber defense technologies:
Security Information and Event Management (SIEM) systems
Network Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
Host Intrusion Detection System/Intrusion Prevention Systems (IDS/IPS)
Network and Host malware detection and prevention (NDR/EDR)
Network and Host forensic applications
Web/Email gateway security technologies
Security Orchestration, Automation, and Response (SOAR)
Ability to demonstrate effective interpersonal, organizational, writing, communications, and briefing skills
Ability to use advanced level analytical and problem-solving skills to solve complex issues
Ability to obtain a CISSP or CEH Certification within 6 months of start date
DoD 8570 IAT Level III or CSSP-SPM within 6 months of start date
Active/Current TS/SCI with polygraph clearance
Preferred Qualifications:
Bachelor’s Degree in Electrical Engineering, Computer Engineering, Computer Science, or other closely related Information Technology field of study
Title: Technical Targeter
Location: McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.
Technical Targeter
McLean, VA
Description: This individual will provide the Tech Targeting team with innovative solutions to identify and track targets of interest. They will leverage tailored discovery and analytic support to sustained and dynamic requests by leveraging expertise in community-specific tools, databases, and tradecraft.
They will deliver full-circle analysis to optimize mission success while ensuring they are in alignment with organizational priorities.
Prior experience as a targeter within the broader organization is required, with technical targeting expertise desired. The optimal candidate will have an open mind and aptitude for learning from a highly skilled, highly niche cadre of individuals who have significant expertise in technical targeting.
Title: Data Scientist
Location: McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense is the Employer of Choice within the Intelligence, Defense, and Space communities of the U.S. Government. Realizing early on that our most prized assets are our employees, we continually focus our attention on improving the overall work/life experience they have supporting the mission. Our Team is pushed every day to use their industry leading knowledge to provide end-to-end solutions to combat our nation’s toughest and most secure problems. If you are looking for a place to not only be professionally challenged, but encouraged and supported by a company that cares, don’t look any further than Cornerstone Defense.
1. (Mandatory) Demonstrated experience in data architecture.
2. (Mandatory) Demonstrated experience with and understanding of database structure principles
3. (Mandatory) Demonstrated experience in data modeling and design, including SQL development and database administration.
4. (Mandatory) Demonstrated experience in data visualization, data migration and data modeling.
5. (Mandatory) Demonstrated experience in relational database management systems (DBMS).
6. (Mandatory) Demonstrated experience in DBMS software, including SQL Server.
7. (Mandatory) Demonstrated experience in database and cloud computing design, architectures and data lakes.
8. (Mandatory) Demonstrated experience in configuration and administration of enterprise level data stores, ETL and ELT methods, and batch and streaming data transport.
9. (Mandatory) Demonstrated experience gathering and analyzing system requirements.
10. (Mandatory) Demonstrated experience with Version control systems such as Git.
11. (Mandatory) Demonstrated experience with programming languages Java and Python.
12. (Mandatory) Demonstrated experience with Linux, Unix, Solaris and Windows.
13. (Mandatory) Demonstrated experience with Agile development methodologies and JIRA.
14. (Mandatory) Demonstrated experience working in a fast-paced, technically challenging area; ability to anticipate and manage changes or problems; assess impacts and recommend sound solutions.
15. (Mandatory) Demonstrated experience in systems development, including system development life cycle, project management approaches and requirements, and design and testing techniques.
16. (Desired) Demonstrated experience with Sponsor networks, systems and services.
17. (Desired) Demonstrated experience delivering solutions with AWS cloud services.
18. (Desired) Demonstrated experience with AWS Cloud storage technologies including RDS, DynamoDB and S3.
19. (Desired) Demonstrated experience in database technologies to include but not limited to Oracle, SQLServer, and Postgres.
20. (Desired) Demonstrated experience with Oracle Databases
21. (Desired) Demonstrated experience with Full stack environment
22. (Desired) Demonstrated experience building automation tools such as Gradle, Maven.
23. (Desired) Demonstrated experience with the development of system prototypes and proof of concept in order to demonstrate proper application of design principles
24. (Desired) Demonstrated experience with the Sponsor’s authentication and authorization process.
25. (Desired) Demonstrated experience with supporting enterprise level production systems
26. (Desired) Demonstrated experience briefing technical topics to a non-technical audience.
27. (Desired) Demonstrated experience in strong oral and written communication.
28. (Desired) AWS Certification or other relevant certifications
General Technical Targeting Analyst
McLean, VA
*Clearance: *Active TS/SCI w/ Polygraph needed to apply *
Company Overview:
Cornerstone Defense, in partnership with our military, intelligence, and civil government customers, supports U.S. operations worldwide through the use of many different types of intelligence, satellite, and cyber technologies. Cornerstone’s Intelligence Sector provides solutions to the United States Government for information collection, operations, exploitation and dissemination, and research activities. Our Team specializes in software development, cloud architecture, systems and network engineering, systems integration, agile management, as well as targeting operations and intelligence analysis. Our support to our mission customers includes cyber network operations, exploitation and defense, signals intelligence, human intelligence, and critical missions and networks.
Required Qualifications: