Summary description:
Blackpoint Cyber LLC's SkillBridge Program Blackpoint Cyber LLC's SkillBridge program offers transitioning US military service members an opportunity to gain valuable civilian work experience through industry-specific training, certifications, and hands-on experience within our organization. As a participant in our SkillBridge internship, you will receive comprehensive training and mentorship to prepare you for your next career step. Our Commitment: At Blackpoint Cyber LLC, we are committed to supporting veterans and bridging the gap between military service and civilian careers. Our program aims to attract and retain talented veterans by offering practical skills and insights relevant to cybersecurity, a critical field in today's digital landscape. We are eager to share our knowledge and expertise with you during this internship. Internship Details: This internship will provide you with a thorough understanding of the role outlined below, equipping you with the skills and experience necessary for success in the cybersecurity industry. TO BE ELIGIBLE FOR DOD SKILLBRIDGE JOB OPPORTUNITES YOU MUST BE AN ACTIVE MEMBER OF THE U.S. MILITARY WITH 180 DAYS OF SERVICE OR FEWER REMAINING PRIOR TO YOUR DATE OF SEPARATION AND HAVE AT LEAST 180 CONTINUOUS DAYS OF ACTIVE SERVICE Company Culture On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape. How You'll Make an Impact: Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting. Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis. Develop Incident analysis reports and work across business units and customers to bring issues to a close. Help design and build operational processes and procedures to improve overall SOC efficiency. Provide actionable threat and vulnerability analysis based on security events for many independent customer environments. Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations. Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis. What you'll Bring: MDR analysts bring Three (3+) years of experience in an information security role. Sr. Analysts will bring Five (5+) years of experience. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement. Experience working in a Security Operations Center (SOC) MDR Analysts bring One (1+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process. Sr. MDR analysts will have Two (2+) years of experience. Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.) Robust understanding of at least two of the following: Windows, Linux or OSX; Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365 Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection) Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences Bonus: Bachelor’s Degree in Computer Science or related technical discipline Network/System Administration and/or Engineering Deep forensic knowledge of Windows, Mac OS and/or Linux Experience in Digital Forensics and Incident Response a plus Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team Capture The Flag (CTF) Development
Job description:
Blackpoint Cyber LLC's SkillBridge Program Blackpoint Cyber LLC's SkillBridge program offers transitioning US military service members an opportunity to gain valuable civilian work experience through industry-specific training, certifications, and hands-on experience within our organization. As a participant in our SkillBridge internship, you will receive comprehensive training and mentorship to prepare you for your next career step. Our Commitment: At Blackpoint Cyber LLC, we are committed to supporting veterans and bridging the gap between military service and civilian careers. Our program aims to attract and retain talented veterans by offering practical skills and insights relevant to cybersecurity, a critical field in today's digital landscape. We are eager to share our knowledge and expertise with you during this internship. Internship Details: This internship will provide you with a thorough understanding of the role outlined below, equipping you with the skills and experience necessary for success in the cybersecurity industry. TO BE ELIGIBLE FOR DOD SKILLBRIDGE JOB OPPORTUNITES YOU MUST BE AN ACTIVE MEMBER OF THE U.S. MILITARY WITH 180 DAYS OF SERVICE OR FEWER REMAINING PRIOR TO YOUR DATE OF SEPARATION AND HAVE AT LEAST 180 CONTINUOUS DAYS OF ACTIVE SERVICE Company Culture On this team, we value high-quality execution, ownership, and strong morals. With us, principles are never tested, and we are proud to always do right by our customers. If you’re a driven professional with a passion for learning and contributing towards the best, then Blackpoint welcomes you. Our team is energetic and collaborative, maintaining a high-performance culture and enabling growth through overcoming challenges in the modern cyberthreat landscape. How You'll Make an Impact: Analyze and evaluate anomalous network and system events in a 24x7x365 Security Operation Center (SOC) environment via conducting lead-less threat hunting. Collaborate with MDR Analysts to research and investigate emerging cyber security threats; become an escalation point of contact for advanced intrusion analysis. Develop Incident analysis reports and work across business units and customers to bring issues to a close. Help design and build operational processes and procedures to improve overall SOC efficiency. Provide actionable threat and vulnerability analysis based on security events for many independent customer environments. Build test lab environments to research emerging techniques and make contributions to the internal and external knowledge development of threat operations. Review sandbox technologies for additional IOCs uncovered from artifacts uncovered during analysis. What you'll Bring: MDR analysts bring Three (3+) years of experience in an information security role. Sr. Analysts will bring Five (5+) years of experience. Progressive relevant training and/or certification may be substituted for one (1) year of the experience requirement. Experience working in a Security Operations Center (SOC) MDR Analysts bring One (1+) years of experience with triaging endpoint events from EDR, NGAV, and supporting the Incident Response (IR) process. Sr. MDR analysts will have Two (2+) years of experience. Deep knowledge on assessing threat indicators in a Windows Environment (e.g. Malware/Malicious Anomalies/Abnormal network Activity/Root Level Compromise, Forensic Artifacts, etc.) Robust understanding of at least two of the following: Windows, Linux or OSX; Familiarity with ELK stack (Dashboards, Logstash Config, Searching) Scripting / Programming with Powershell, Python, and Go Familiarity with AWS services such as EC2, S3 and IAM and Azure/M365 Experience in developing, refining, and performing leadless threat hunting analysis to uncover new or potential incidents and report on results Excellent problem solving, critical thinking, and analytical skills with the ability to deconstruct issues (hunting anomalous pattern detection) Excellent written and verbal communication skills to effectively summarize and present technical findings to both technical and non-technical audiences Bonus: Bachelor’s Degree in Computer Science or related technical discipline Network/System Administration and/or Engineering Deep forensic knowledge of Windows, Mac OS and/or Linux Experience in Digital Forensics and Incident Response a plus Malware Analysis (Behavioral and/or Static analysis- IDA, Cuckoo Sandbox, x86/x64 Debugging) Pentesting/Red/Blue Team Capture The Flag (CTF) Development