LET’S OUTSMART CYBER CRIME TOGETHER

We care about our customers, we care about our people and we care about solving real-world problems. We are looking for the best of the best to join our passionate, knowledgeable, and experienced team to help combat cyber threats and protect our customers’ most valuable assets.

At Oxford Solutions, we know what it takes to defend against cyber criminals and we stay ahead of threats by constantly innovating and engineering creative solutions that outsmart the adversaries. If you are interested in being at the forefront of cyber security, we want to hear from you.

Sales Development

Oxford Solutions is a leader in cyber security protection of high-risk assets for corporations. We provide enterprise-wide cyber security detection, deterrence, mitigation and remediation through highly qualified people, proven processes and innovative technology. We leverage our extensive intelligence-community based experience to deliver comprehensive and cost-effective solutions encompassing people, processes and technology.

Roles and Responsibilities

We are looking for a sales person to help create and execute on our company’s sales strategy. The ideal candidate is a rising star, seeking that next step in their career, with a truly dynamic high-growth company. This person must be energetic, creative, performance-driven, and have a proven background in successfully selling tech products, services, or software to commercial businesses. In this role you will do the following:

  • Meet and exceed monthly/ quarterly sales activities and revenue targets;
  • Cover new leads and maintain a robust sales pipeline;
  • Interact with senior executives in business and technology functions, across multiple industries;
  • Effectively communicate the Cybersecurity landscape and relevant cyber threats to prospects;
  • Carefully listen and understand customer needs and how our offerings could address those needs;
  • Deliver articulate and compelling value propositions around our products and services (on most sales calls, you will be joined by one of our Cybersecurity experts to handle technical questions, explain our Cybersecurity credentials, etc.);
  • Effectively deliver sales demonstrations and presentations;
  • Own and manage the entire sales process and all tactics and communications with prospects.

Desired Skills and Experience

  • 5-8 years of Sales with technology/ software-as-a-service products;
  • Proven “hunter” background with a track record of consistent over-quota performance and top-tier company ranking;
  • Proven track record of building trusted customer relationships;
  • Selling experience to both middle-market and large organizations (enterprise level);
  • Strong C-level/ senior executive communications skills;
  • Excellent conversational/ interpersonal skills;
  • Excellent situational awareness and ability to “think on your feet”;
  • Creative problem-solving skills to navigate the sales process and challenging sales situations;
  • Proven ability to remove barriers and get to the decision maker;
  • Rigorous focus on client success;
  • Independent thinking with good judgment skills;
  • Strong organizational skills and disciplined follow-up with customers;
  • Good business acumen, experience with basic contracts and pricing.

This position offers an excellent compensation package: annual salary, monthly commissions, growth opportunity and no limitation to your annual revenue potential.

Oxford Solutions is an EOE.

Please send an email to: info@oxfordsolutions.com and include a cover letter, most recent resume and your salary requirements.

Penetration Testing Engineer

Oxford Solutions is a leader in cyber security protection of high-risk assets for corporations. We provide enterprise-wide cyber security detection, deterrence, mitigation and remediation through highly qualified people, proven processes and innovative technology. We leverage our extensive intelligence-community based experience to deliver comprehensive and cost-effective solutions encompassing people, processes and technology.

Essential Duties and Responsibilities

Penetration testing with a focus on:

  • Web applications pen testing (XSS, SQL Injection) should be a priority
  • Automation and/or manual testing
  • Systems (varied by type and configuration)

Successful candidates must possess a thorough working knowledge of common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, databases and web applications.

Successful candidates must be able to quickly master new technology / software for the purposes of evaluating or subverting the security functionality of the technology / software.

The security projects undertaken will range in complexity and duration but typically require two weeks planning, two weeks testing, and two weeks to analyze information and report findings. The level of effort for each assessment varies dependent on the size and complexity of the system tested and the technologies employed.

Candidate will provide technical information system security testing in support of the appropriate security risk management process. Techniques used in the security assessment and technical testing efforts include in-depth network and application vulnerability testing (both automated and manual testing), demonstrable false positive validation. Automated testing will include tools such as: Tenable Nessus, Cenzic Hailstorm, BurpSuite Professional, DBProtect, Core Impact, Nmap, Metasploit, and other tools found in the BackTrack and Samurai Web Testing Framework distributions.

The candidate shall develop documentation in support of testing efforts that may include: Test Plans, Preliminary Findings Reports, Security Assessment Reports, and other, similar test artifacts, as required by the government.
Desired Skills and Experience

Candidates should be skilled in multiple of the following areas:

Operating Systems: expert understanding of the following operating systems and their related security concerns

  • Microsoft Windows desktop/server operating systems (Microsoft Windows 2000 and up)
  • UNIX and Linux, especially Ubuntu, Red Hat Enterprise, SUSE Enterprise, and knowledge of UNIX variants
  • Apple OS X operating systems

Web Applications & Technologies: advanced understanding of application programming languages, application servers, web services, browser technology, common vulnerabilities, security best practices, and automated assessment tools and manual testing techniques specific to web applications. Working knowledge of JavaScript, AJAX, PHP, Perl, SOAP-based web Services and ability to perform code review in Java, C# and/or .Net.

Enterprise Solutions, Storage & Databases: advanced understanding of relational database, database management systems, enterprise storage solutions, and security concerns specific to these technologies.

Software Programming: experience with Java, Microsoft .NET, Python, Perl, Ruby, Linux/UNIX Shell Scripting.

In addition to one or more of the critical skills listed above, all candidates must be knowledgeable in the following areas:

  • All candidates shall be comfortable using, configuring, troubleshooting, and administering both Linux and Microsoft operating systems with extensive experience with at least one of these operating systems.
  • Have a broad knowledge of security best practices, security solutions, and methodologies for conducting advanced security assessments, to include manual assessments and malicious user testing.
  • Have a broad and expert knowledge of security assessment tools and manual security testing techniques. Advanced understanding of security tool strengths and weaknesses and ability to select, configure, troubleshoot and use the best “tool for the job”.
  • Have a broad knowledge of cyber security threats and techniques used by adversaries to compromise systems – both technical and non-technical techniques.
  • Have the ability to think creatively, to think critically, to analyze complex concepts, to articulate themselves clearly and concisely, and to conduct themselves in a professional manner.

Oxford Solutions is an EOE.

Please send an email to: info@oxfordsolutions.com and include a cover letter, most recent resume and your salary requirements.

Senior SOC Engineer/Intrusion Analyst

If you have a strong technical background, proven experience in intrusion analysis and incident response and are looking for the opportunity to make an impact by improving intrusion detection capabilities and information security practices, then we want to hear from you!

Join Oxford Solutions as a Senior SOC Intrusion Analyst and become part of the premier organization focused on today’s evolving cyber security threats. You will primarily be responsible for responding to critical incidents within the customer enterprise environment. You also will have the opportunity to identify and recommend improvements that will maximize intrusion detection capabilities and leverage Oxford Solutions expertise in support of client objectives.

The successful candidate will possess in-depth understanding of the current threat landscape and will have experience supporting security analysis and incident response functions within an Enterprise Security Operations Center (SOC) environment.

Essential Duties and Responsibilities

  • Review and analyze security events, determine their severity, and author reports detailing the activity
  • Respond to computer security events and conduct analysis as directed
  • Provide support for Malware Analysis and Reverse Engineering
  • Provide expert understanding of network protocols, TCP/IP fundamentals
  • Provide expert understanding of log, network and system analysis techniques
  • Provide expert understanding of operating systems (Windows, Linux or OS X)

Required Technical Skills

  • Expert understanding of log, network and system analysis techniques
  • Expert understanding of Security Information Event Management (SIEM) such as Arcsight, Splunk, RSA Envision, and Q1 Radar.
  • Expert understanding of intrusion detection systems (e.g., Snort, Suricata) and tools (e.g., tcpdump, Wireshark)
  • Expert understanding of network protocols and TCP/IP fundamentals
  • Proven understanding and in-depth knowledge of operating systems (Windows, Linux or OS X)
  • Knowledge of enterprise systems and infrastructure, network based services and client/server applications
  • Familiarity with network architecture and security infrastructure placement
  • Familiarity with security tools such as antivirus, full packet capture and data loss prevention tools

Other Required Skills

  • Proven ability to successfully interface with clients in a multidisciplinary environment
  • Excellent communication skills and ability to document and explain technical details clearly and concisely
  • Familiarity with host based investigation tools (e.g., MIR, EnCase, Forensic Toolkit)
  • Ability to support 24/7 on-call rotation
  • Ability to travel on short notice
  • Willingness to travel up to 10%
  • Candidates will be subject to a background investigation

Education/Experience

  • BS or equivalent degree in Computer Science or related technical discipline
  • 2+ years performing intrusion detection, analysis and incident handling
  • 4 years experience in an information technology or security discipline
  • GCIA and/or GCIH certifications preferred

Responsibilities for the roles may include but would not be limited to:   – Eyes on glass monitoring and resolution of security incidents within established customer Service Level Agreements.   – Performing daily operational ‘eyes on glass’ real-time monitoring and analysis of security events from multiple sources including but not limited to events from Security Information Monitoring tools, network and host based intrusion detection systems, firewall logs, system logs (Unix & Windows), mainframes, midrange, applications and databases. – Additional responsibilities will include performing documentation review and improvement, attending meetings as needed, serve front line response for troubleshooting low-level engineering issues as needed. – Collaborate with Line of Business technical teams for issue resolution and mitigation. – Communicate and escalate issues and incidents as required by process or management. – Specialize in network and log centric analysis. – Use of IDS, IPS, and/or other signature matching technology

Additional Responsibilities

  • Perform other essential duties as assigned

Resident’s Knowledge, Skills, & Abilities

  • 3 – 5 years of Information Technology experience with network technologies, specifically TCP/IP, and related network tools.
  • A sound understanding of TCP/IP and networking concepts
  • Solid and demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management
  • Understanding of source code, hex, binary, regular expression, etc.
  • Experience with reviewing raw log files, data correlation, and analysis (i.e. firewall, network flow, IDS, system logs)
  • Strong deductive reasoning, critical thinking, problem solving, and prioritization skills
  • Experience assisting the development and maintenance of tools, procedures, and documentation
  • Customer service including the resolution of customer escalations, incident handling, and response
  • Experience in a fast paced, high stress, support environment
  • Subject matter expert (SME) in one or multiple areas such as Windows, Unix, Midrange, Mainframe, Firewalls, Intrusion Detection, Threat Detection Analysis, or Information Risk Management
  • Ability to follow detailed process and procedure documentation
  • Ability to present complex solutions and methods to general community
  • Demonstrated ability to be reliable and flexible
  • Excellent written and verbal communication and organizational skills
  • Outstanding work ethic
  • Strong team player that collaborates well with others to solve problems and actively incorporate input from various sources
  • Network, Security, or Platform certification(s) (S+, N+, MCSP, CNA)
  • CISSP or SANS GIAC GCIA certification desired

Please send an email to: info@oxfordsolutions.com and include a cover letter, most recent resume and your salary requirements.

Cybersecurity Implementation Engineer

Oxford Solutions is a leader in cyber security protection of high-risk assets for corporations. We provide enterprise-wide cyber security detection, deterrence, mitigation and remediation through highly qualified people, proven processes and innovative technology. We leverage our extensive intelligence-community based experience to deliver comprehensive and cost-effective solutions encompassing people, processes and technology.

ROLES AND RESPONSIBILITIES:

The Cyber Security Implementation Engineer is responsible for installing customer premise equipment (CPE), establishing connectivity with CPE devices, tuning security events generated by CPE devices and working with customers to phase in our proprietary security platform in support of their overall security program.  The Cyber Security Implementation Engineer will work side-by-side with other cyber security engineers within a 24x7x365 managed security service environment to support the timely delivery of monitoring capabilities across a wide spectrum of customers. Some of the responsibilities of the Cyber Security Implementation Engineer are:

  • Stage and configure customer premise equipment to include UTMs, VPNs, SIEMs, virtual machines, and taps
  • Troubleshoot customer premise equipment to include UTMs, VPNs, SIEMs, virtual machines, and taps
  • Lead the onsite installation of customer premise equipment to include UTMs, VPNs, SIEMs, virtual machines, and taps
  • Tune and train SIEMs to weed out false positives
  • Monitor client networks for security events, and alert clients to potential (or active) threats, intrusions, and/or compromises during the tuning/training phase
  • Interact directly with customers (daily or weekly) to manage the onboarding process
  • Understand the global threat landscape and track changes in this area, as well as understand the direct and indirect impact to the customer base
  • Conduct research and map out responses to emerging threats, including the level of impact and exposure to our customers, and ensure that the managed security service has thorough detection capabilities in place for emerging threats
  • Perform triage of service requests from internal teams
  • Act as a subject matter expert for advanced technology, architecture and threat-related questions from internal staff

Example of tools utilized and preferred skills:

  • Network Monitoring and NetFlows
  • Network/Host Intrusion Detection/Prevention Systems
  • Vulnerability/Port Scanning
  • Virtual Environments
  • WireShark/tcpdump, Snort/Suricata, netcat, ELK, OSSIM, OSSEC, nmap, etc.
  • Excellent verbal skills, documentation skills, analytical skills and problem solving skills
  • Experience in analyzing security logs generated by IDS/IPS, firewalls, Anti-Virus, and/or other security logging sources
  • Strong understanding of networking and associated protocols: (TCP/IP, UDP, ICMP, HTTP/S, DNS, SMTP, SSH, FTP, NTP, etc.)
  • Ability to develop scripts to aid in analysis and integration (Python, Perl, Ansible, etc.)
  • Possess an in-depth understanding of Windows and Linux systems

 EDUCATION AND EXPERIENCE PREFERRED:

  • BS/MS degree in Computer Science, Computer Engineering, Math, Information Security, or a related field
  • 5+ years of experience delivering cyber security solutions to an enterprise or within a cyber security services organization
  • Desirable certifications include CEH, GCIA, GCIH, GPEN or similar

Oxford Solutions is an EOE.

Please send an email to: info@oxfordsolutions.com and include a cover letter, most recent resume and your salary requirements.

Software Engineer

The qualified candidate will develop cybersecurity tools and systems by designing, developing, and installing software solutions. Will also assist with automation and workflow across a variety of organizational platforms. Complete the development of a specialized cybersecurity forensic tool while continuing to improve features and functionality as an ongoing effort.

The top qualified candidate will be part of a development team that has the following Software Engineering job duties:

  • Determines operational feasibility by evaluating analysis, problem definition, requirements, solution development, and proposed solutions.
  • Documents and demonstrates solutions by developing documentation, flowcharts, layouts, diagrams, charts, code comments and clear code.
  • Prepares and installs solutions by determining and designing system specifications, standards, and programming.
  • Improves operations by conducting systems analysis; recommending changes in policies and procedures.
  • Obtains and licenses software by obtaining required information from vendors; recommending purchases; testing and approving products.
  • Updates job knowledge by studying state-of-the-art development tools, programming techniques, and computing equipment; participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
  • Protects operations by keeping information confidential.
  • Provides information by collecting, analyzing, and summarizing development and service issues.
  • Accomplishes engineering and organization mission by completing related results as needed.
  • Develops software solutions by studying information needs; conferring with users; studying systems flow, data usage, and work processes; investigating problem areas; following the software development lifecycle.

SOFTWARE ENGINEER SKILLS AND QUALIFICATIONS:

Proven past experience and enterprise success with .NET and C++ programming languages, as well as Analyzing Information, General Programming Skills, Software Design, Software Debugging, Software Documentation, Software Testing, Problem Solving, Teamwork, Software Development Fundamentals, Software Development Process, Software Requirements

Please send an email to: info@oxfordsolutions.com and include a cover letter, most recent resume and your salary requirements.

INTERESTED IN JOINING A STELLAR CYBERSECURITY TEAM?

Let’s work together to stop cyber threats.