Principal Digital Forensics & Loss Prevention Analyst - Remote Job at Amtrak, Washington DC

VzFtYWc3azFtM1pDaEZYVC9IVHlrN1Ew
  • Amtrak
  • Washington DC

Job Description

Principal Digital Forensics & Loss Prevention Analyst

Your success is a train ride away! As we move America's workforce toward the future, Amtrak connects businesses and communities across the country. We employ more than 20,000 diverse, energetic professionals in a variety of career fields throughout the United States. The safety of our passengers, our employees, the public and our operating environment is our priority, and the success of our railroad is due to our employees.

Are you ready to join our team? Our values of 'Do the Right Thing, Excel Together and Put Customers First' are at the heart of what matters most to us, and our Core Capabilities, 'Building Trust, Accountability, Effective Communication, Customer Focus, and Proactive Safety & Security' are what every employee needs to know and do to be most impactful at Amtrak. By living the Amtrak values, focusing on our capabilities, and actively embracing and fostering diverse ideas, backgrounds, and perspectives, together we will honor our past and make Amtrak a company of the future.

The Principal Cyber Threat Incident Response Analyst will play a critical role within the Amtrak Cyber Fusion Center. In this role, you will support a digital forensic cyber incident response team to effectively respond to and recovering from cybersecurity incidents. You will execute the cyber incident response plan, response playbooks, and will ensuring timely resolution of security breaches.

Essential Functions:

  • As a Principal Cyber Threat Incident Response Analyst, you will provide industry-leading cyber incident response supporting the Cyber Fusion Center mission to effectively detect and respond to threats and reduce the overall impact of business risk before, during, and after an incident.
  • You will be able to resolve security incidents quickly, effectively and at scale with complete incident response including investigation, containment to support effective remediation, and crisis management.
  • In this role, you will technically navigate critical and high-profile incidents, performing digital forensic and incident response analysis with support from threat hunting, and malware triage analysts.
  • Support Amtrak-wide cyber incident response engagements, examine cloud, endpoint, and network-based sources of evidence.
  • Recognize and codify attacker Tools, Tactics, and Procedures (TTPs) and Indicators of Compromise (IOCs) that can be applied to current and future investigations.
  • Build scripts, tools, or methodologies to enhance Amtrak's incident investigation processes.
  • Conduct host forensics, network forensics, log analysis, and malware triage in support of incident response investigations.
  • Support Cyber Incident Exercises, Tabletops, and Cyber Incident Management Response Team with business leaders, stakeholders, and cross-functional teams.
  • Support with Crisis Management, Emergency Management, Incident Response, Legal and OIG teams to conduct and coordinate on Cyber Incident Response Activities.
  • Preferred knowledge and familiarity with Operational Technology (OT), Industrial Controls Systems (ICS) or Supervisory Control and Data Acquisition (SCADA) systems but not required.
  • Cybersecurity certifications, courses, or hands-on experience with some of the following:
    • Advanced Threat Detection
    • Hacker tools, techniques
    • Penetration Testing, Exploit Writing, and Ethical Hacking
    • Offensive Security, Security Operations, Web Application Testing, or Cloud Security
    • Reverse-Malware Engineering
    • Digital Forensics and Incident Response
    • PowerShell, JavaScript and Python
    • Relevant certifications including GIAC Certified Incident Handler (GCIH), Certified Incident Response Handler (GCFA) or similar
    • Experience with using SIEM systems, network security tools, and log analysis tools
    • Experience with cyber incident response
    • Experience with Mitre ATT&CK framework
    • Experience with threat intelligence, vulnerability management, and security incident response
  • Regularly participate in tabletop exercises designed to identify gaps, improve skills, enhance communication, and engage with stakeholders.
  • Review technical reports from vulnerability and penetration testing assessments, as well as results from tabletop exercise to identify potential future incidents.
  • Develop, refine, recommend, and maintain playbooks, policies, and procedures to ensure alignment to industry best practices.

Minimum Qualifications:

  • Bachelor's degree in computer science, Information Systems, Cybersecurity, or related technical field plus 7-10 years of relevant experience is required.

Experience on one or the combination of the below to satisfy education and experience requirements:

o Incident Response o Vulnerability Management o Digital Forensics o Network or Cloud Security o Penetration Testing

One incident response centric certification:

  • GIAC Certified Incident Handler (GCIH) o GIAC Response and Industrial Defense (GRID) o GIAC Battlefield Forensics and Acquisition (GBFA) o GIAC Certified Forensic Examiner (GCFE) o GIAC Advanced Smartphone Forensics o GIAC Certified Forensic Analyst (GCFA) o GIAC Network Forensic Analyst (GNFA) o GIAC Reverse Engineering Malware (GREM) o EC-Council Certified Incident Handler (E|CIH) o eLearnSecurity Incident Handling & Response Professional (IHRP) o SEI Computer Security Incident Handler (CSIH) o NICCS Certified Incident Handler Engineer (CIHE)

In depth understanding of threats, vulnerabilities and principals of incident response and chain of custody.

  • Hands on experience with forensics tools and log correlation.
  • Ability to think like an attacker and hunt within the security tool stack.
  • Ability to incorporate the MITRE ATT&CK Framework in everyday processes.

Preferred Qualifications:

  • Master's degree in Cybersecurity, Information Technology, Digital Forensics, Computer Science, or equivalent technical field
  • 10+ years of experience within the cybersecurity field
  • Basic knowledge of Operation Technology (OT), SCADA, HVAC and/or IoT

Two or more incident response centric certifications:

o GIAC Certified Incident Handler (GCIH) o GIAC Response and Industrial Defense (GRID) o GIAC Battlefield Forensics and Acquisition (GBFA) o GIAC Advanced Smartphone Forensics o GIAC Certified Forensic Analyst (GCFA) o GIAC Network Forensic Analyst (GNFA) o GIAC Reverse Engineering Malware (GREM) o EC-Council Certified Incident Handler (E|CIH) o SEI Computer Security Incident Handler (CSIH) o NICCS Certified Incident Handler Engineer (CIHE) o eLearnSecurity Incident Handling & Response Professional (IHRP)

  • GIAC Certified Forensic Examiner (GCFE)

Work Environment:

  • Amtrak offers several options for a working environment including 100% remote, on-site, and/or a hybrid schedule.
  • This is a position that requires off-hours work and on-call participation.
  • Please note your headquarters office may be in any one of Amtrak's locations across the United States. The ability and willingness to travel up to 30% to other office locations is required.

Communications and Interpersonal Skills: Must have excellent oral and written communication skills.

Job Tags

Work at office, Remote work,

Similar Jobs

American Medical Staffing

Registered Nurse - Correctional - $1,746 per week Job at American Medical Staffing

 ...American Medical Staffing is seeking a travel nurse Correctional for a travel nursing job in Philadelphia, Pennsylvania....  ...population. Whether in a correctional setting, behavioral health facility, or public health unit, your care will directly impact patient safety,... 

ABB

Assembler - 3rd Shift Job at ABB

 ...At ABB, we help industries outrun - leaner and cleaner. Here, progress is an expectation - for you, your team, and the world. As a global market leader, we'll give you what you need to make it happen. It won't always be easy, growing takes grit. But at ABB, you'll never... 

AAA

Claims Senior Casualty Adjuster Job at AAA

 ...Claims Senior Casualty Adjuster The Claims Senior Casualty Adjuster handles moderate to high complexity claims involving material damage, property and/or liability lines of insurance written by the Interinsurance Exchange in compliance with all regulatory and statutory... 

Strava

Director, UX Research (San Francisco) Job at Strava

 ...researchers and report directly to the Chief Design Officer. We are looking for a UX Research leader who can establish a vision and culture that empowers a team of talented researchers to deliver exceptional research. You will drive research across multiple user... 

ContactLink Solutions

Spanish Freelance US-Based Interpreter Job at ContactLink Solutions

 ...Job Description Job Description LANGUAGE : Spanish US-Based Interpreter As a remote interpreter, you play a significant role in facilitating communication between SPANISH and English speakers. The interpreter needs to be able to process information quickly and...