躂圖AV Blog Archives — 躂圖AV /category/blog/ Powerful solutions for a complex world Thu, 18 Apr 2024 13:57:01 +0000 en-US hourly 1 https://wordpress.org/?v=6.5.3 /wp-content/uploads/2019/03/Red-Mark-600px@2x-100x100.png 躂圖AV Blog Archives — 躂圖AV /category/blog/ 32 32 Day In The Life: Leo Pryor, SOC Analyst /ecs-insight/blog/day-in-the-life-leo-pryor-soc-analyst/ Thu, 18 Apr 2024 11:00:22 +0000 http://ecstech.flywheelstaging.com/?p=22533 Leo Pryor, SOC analyst, discusses the day-to-day challenges that SOC analysts face, the importance and rewarding nature of the work they do, and why this is a critical field for skilled professionals looking to make a difference.

The post Day In The Life: Leo Pryor, SOC Analyst appeared first on 躂圖AV.

]]>

The job of a security operations center (SOC) analyst is crucial. They maintain information and network security by detecting, investigating, and remediating cybersecurity threats. SOC analysts are on the front lines in an organizations battle against cyber threats and test existing cybersecurity infrastructure for vulnerabilities and weaknesses in order to make improvements.

We sat down with Leo Pryor, 躂圖AV SOC analyst, to discuss the day-to-day challenges that SOC analysts face, the important and rewarding nature of their work, and why cybersecurity is a critical field for skilled professionals interested in meeting the moment and making a difference.

PART ONE
PART TWO
PART THREE

躂圖AV delivers SOC-as-a-service, endpoint security platform-as-a-service, vulnerability management, and continuous monitoring solutions to leading enterprises across government and industry. The 躂圖AV SOC is powered by more than 50 unique commercial and open-source intelligence feeds and a cyber threat intelligence team that currently tracks more than 17,000 adversaries.

Working as a SOC analyst with 躂圖AV means doing work that matters, expanding your knowledge and expertise, and protecting some of the worlds most-targeted networks.

Ready to meet the moment and make a difference? Visit our career center to learn more.

The post Day In The Life: Leo Pryor, SOC Analyst appeared first on 躂圖AV.

]]>
How to Make Your Interview Count /ecs-insight/blog/how-to-make-your-interview-count/ Wed, 17 Apr 2024 11:00:25 +0000 http://ecstech.flywheelstaging.com/?p=13583 This how-to article provides job seekers with interviewing tips from 躂圖AV recruiting professionals.

The post How to Make Your Interview Count appeared first on 躂圖AV.

]]>

Listen to article:

The new year often brings new career opportunities, and that means tackling job interviews. How can you make a great impression when you interview for a job? We asked three 躂圖AV recruiters to share interviewing tips for job applicants in the IT sector and beyond, and heres what we learned.

KATELYN TALLEY

RECRUITING LEAD, ENTERPRISE BUSINESS UNIT

When applying and interviewing for your next job, its important to research each specific role and organization. Tailoring your resume and interview conversations to the position you are applying for can help you to stand out from other candidates.

Researching the organization youre interviewing with shows that youre interested and invested in the position and company. Your main goal during these conversations is to show that you are the right person for that job. By showing that youve invested time researching, you better market yourself to the recruiter or hiring manager.

In the IT field, its critical to learn from others due to the rapid changes in technology and the constant growth of the industry. Networking with professionals who hold the type of position youre interviewing for can help you gain insights that make you a better interviewee. Happy hunting!

When recruiting for a specific job, I speak to many candidates with similar skill sets and qualifications. There are two main attributes that stand out: confidence and overall interest in the company and position. Candidates who are able to confidently articulate and demonstrate knowledge of the interviewers, company, and job responsibilities are those who tend to stand out during the interview process.

Be sure to learn about your interviewer prior to the interview; look for interests or attributes that you and the interviewer share. You should always research the company and job prior to the interview. It will help you learn about the companys mission, culture, and how the specific job you are applying for fits into the bigger picture.

Be enthusiastic and confident! Discuss your ideas, goals, successes, and any challenges you have faced in your professional life. Give thorough responses with examples in your interviews.

MELANIE HUBBARD

SENIOR CORPORATE RECRUITER, ENTERPRISE 躂圖AV

VICTORIA BAKER

SENIOR RECRUITER

Keep your resume in front of you during the interview so you can refer to it, as the interviewer will likely ask specific questions about it. If this is a virtual interview, log in a few minutes early just in case you have technical issues.

Remember that youre interviewing them as much as theyre interviewing you. Make sure you prep with interview questions that are important to you (growth opportunities, team culture, daily tasks, etc.). This will show your interviewer that youre interested in the position, and the info you gather will help you gauge how good a fit it is for you.

Consider looking up the interviewer on LinkedIn and finding a talking point. Did you go to the same school? Do you have connections in common? Did you work on a similar project? These are all great talking points to open a conversation up.

Be prepared to discuss specific accomplishments youve achieved in your career. Youll likely get a name-a-time-when question, such as Can you describe a time when you did not agree with a decision your supervisor made? Its important to respond to such questions with specifics. If you cant think of a specific example, the second-best response is to explain what you would do in this situation.

Finally, review the interview questions on Glassdoor.com. While they are general questions, reviewing them will help you prepare for the types of questions typically asked by employers. Best of luck!

At 躂圖AV, were growing our team of cybersecurity, data and artificial intelligence, and IT Operations professionals. If youre looking for an exciting new opportunity at an industry-leading organization, 躂圖AV may be the next step in your career journey.

Meet the challenge and submit your resume today.

The post How to Make Your Interview Count appeared first on 躂圖AV.

]]>
The Power of Predictive Security: How AI Helps Prevent Cyberattacks /ecs-insight/blog/the-power-of-predictive-security-how-ai-helps-prevent-cyberattacks/ Tue, 16 Apr 2024 11:00:23 +0000 http://ecstech.flywheelstaging.com/?p=26063 躂圖AV Pathfinder leverages AI to deliver predictive security, enabling organizations to identify and mitigate risks before bad actors attack.

The post The Power of Predictive Security: How AI Helps Prevent Cyberattacks appeared first on 躂圖AV.

]]>
By
Director of Cyber Analytic Products

In a hyper-connected world where cyber threats are evolving at an alarming pace, traditional reactive security measures are no longer sufficient to safeguard sensitive information and critical infrastructure. As a result, cybersecurity professionals focus has shifted towards proactive and predictive security solutions that can anticipate and thwart cyberattacks before they strike.

The technology that makes this possible? Artificial intelligence (AI), an increasingly critical component of modern cybersecurity.

The Need for PredictiveCybersecurity: Shifting the Paradigm

Traditional cybersecurity strategies are akin to locking the doors of a house after an intruder has already gained access. Reactive approaches entail identifying and responding to threats as they occur, leaving little room for proactive defense.

Predictive security is more like knowing a would-be intruder is coming before they ever make it to your front door. It represents a conscious paradigm shift, enabling organizations to anticipate and mitigate potential risks before bad actors attack. By harnessing the power of AI, your cyber analysts are better equipped to analyze vast amounts of historical data, identify patterns, and predict attack vectors with unprecedented accuracy.

A More Intelligent Arsenal

AI algorithms can continuously learn from real-time data, enabling your cybersecurity tools to adapt to evolving threats and making your whole security posture more nimble and agile. By analyzing historical cyberattack patterns and discerning the tactics employed by malicious actors, your analysts can predict and prioritize potential vulnerabilities that may be exploited.

Enter 躂圖AV Pathfinder

Identifying your organization’s need for predictive security is an essential first step, but how do you meet that need? Where do you turn for the expertise to execute this paradigm shift in your cybersecurity?

Enter 躂圖AV Pathfinder, an AI-powered cyber analytics platform that leverages historical data and advanced algorithms to predict exploitable entry points and help counter cyberattacks.

Pathfinder’s predictive capabilities are based on three fundamental pillars:

ATTACK PROBABILITY

Pathfinder’s AI scrutinizes historical attack data and determines the likelihood of certain cyber threats occurring. By quantifying the probability of various attacks, organizations can focus their resources on the most pressing threats and determine which can be scheduled for triage at a later date.

PERVASIVENESS

Not all vulnerabilities are equal; some may be widespread and impact numerous systems, while others are niche and affect only specific configurations. Pathfinder considers how pervasive potential vulnerabilities are, ensuring that high-risk, widespread vulnerabilities are addressed immediately.

URGENCY

Pathfinder identifies the criticality of vulnerabilities and determines the potential harm they may cause if exploited. Prioritizing urgent vulnerabilities allows organizations to allocate resources efficiently and protect against the most severe threats.

Force Your Adversaries Into a Losing Battle

The real strength of predictive security lies in its ability to force adversaries into an unfavorable position. By proactively addressing potential weaknesses, organizations employing 躂圖AV Pathfinder can create a lower-risk environment, making it increasingly difficult for attackers to find exploitable entry points. As the organization’s defenses become more robust and resilient, malicious actors encounter diminishing returns for their efforts a powerful deterrent.

The power of predictive security, fueled by AI algorithms and historical data analysis, is revolutionizing the way organizations defend against cyberattacks. 躂圖AV Pathfinder can force your adversaries into an uphill battle, meaning your organization can stay one step ahead in an ever-evolving threat landscape.

Ready to shift the paradigm?

Contact Our Experts

The post The Power of Predictive Security: How AI Helps Prevent Cyberattacks appeared first on 躂圖AV.

]]>
Building a Better Cyber Team /ecs-insight/blog/building-a-better-cyber-team/ Thu, 04 Apr 2024 04:01:04 +0000 http://ecstech.flywheelstaging.com/?p=12601 Cybersecurity has struggled to be an inclusive industry since its inception. We spoke to our leading women in cyber to get their take on creating an inclusive and equitable cyber team.

The post Building a Better Cyber Team appeared first on 躂圖AV.

]]>

The cybersecurity industry has a labor problem. In the United States, we now have up to , and only 26% of cybersecurity professionals under the age of 30 are women.

What can organizations and institutions do to close the gender gap in cybersecurity, and ultimately, the cyber skills gap? Research shows that to build strong cyber teams, employers and the wider industry need to make cybersecurity a welcoming career for all.

To understand 躂圖AV approach towards equitable and inclusive cyber teams, we spoke to a few of the women leading our cyber teams. We are continually inspired by these women and look forward to keeping the conversation going.

BEVERLY
GOODWIN

Executive Director, Governance, Risk, and Compliance | Cybersecurity Assurance

SHAYLA
TREADWELL

VICE PRESIDENT, GOVERNANCE, RISK, AND COMPLIANCE

JOANNA
DEMPSEY

VICE PRESIDENT, CISA PORTFOLIO, JUSTICE AND HOMELAND 躂圖AV

JOANNE
MORRIS

VICE PRESIDENT, ENTERPRISE 躂圖AV

RAMONA
ZILLIGEN

PROGRAM MANAGER, ARMY ENDPOINT SECURITY SOLUTION

What does a successful cybersecurity career mean to you?

For me, success means learning from failures and turning them into lessons learned. It also means work-life balance: being happy, enjoying my work, and looking forward to each day's challenges, while still growing as a professional.

I am grateful to be part of the 躂圖AV cybersecurity team, knowing I can continue to grow and learn more all the time. I am fortunate to be happy and fulfilled in my career that is my definition of success.

Ramona ZilligenProgram Manager, Army Endpoint Security Solution (AESS)

How do you approach diversity and equity challenges within your team?

There is a tendency people have where they think no one is paying attention to their behavior. Making it known that people are heard and seen is important when identifying diversity and equity challenges. With recent events coming to light, I assumed that people knew that I condemn any type of hate within my team, but I had a team member reach out to me and let me know that they needed me to acknowledge what was going on. After addressing this directly with the team, we all felt relieved that there was more space to talk safely to address these issues.

Joanna DempseyVice President, CISA Portfolio, Justice and Homeland Solutions

What are some characteristics that you think make a team successful?

Cognitive diversity. It is so important that you dont let groupthink get in the way. Identify people with different backgrounds and experiences so that you can come to an agreement and make the best decision for everyone. Allow people to highlight things you wouldnt otherwise think about as well.

Shayla TreadwellVice President, Governance, Risk, and Compliance

How do you handle a situation in which you dont agree with the group consensus?

I present my opinion in a positive manner, and I listen in a positive manner too. Everyones opinion has value, but sometimes a different opinion is a better situational fit. No matter how experienced I am, theres always an opportunity to learn. Teams are stronger than individuals, so its key to let every voice be heard and then work with the team to move forward with a single voice.

Joanna MorrisVice President, Enterprise Solutions

What are the top three habits that you would recommend to someone seeking a leadership role?

1

Lead by example.

Be willing to follow the same rules and practices you expect from your team. This habit will help establish expectations and build trust with your employees. The workplace changes in response to COVID-19 presented many opportunities to lead by example. All of us had to adapt to remote work and stressful video meetings with kids or pets in the background. I also learned through frequent check-ins with staff that they were tending to work longer hours and experience burnout from never leaving the workplace. As leaders, we need to recognize how these changes impact work life balance and encourage employees to factor in breaks and establish boundaries between work and home life.
2

Communicate vision and goals clearly.

It is very difficult to lead a team if they dont grasp their larger goal and vision. Refresh and remind your team why their work adds value and where they fit into the bigger picture.
3

Stay calm under pressure.

Challenges arise every day, and how you respond makes the difference. Women often feel that we need to be perfect in every situation, but we dont. Letting go of this expectation helps us to reframe challenges and stay focused on whats important, especially during stressful situations. When facing challenges, practice responding over reacting. Take a deep breath, ask questions to understand the problem, and guide teams through effective solutions.

“”

Beverly GoodwinExecutive Director, Governance, Risk, and Compliance Cybersecurity Assurance

At 躂圖AV, we believe in diversity and inclusion at all levels. If you are looking for a career in cybersecurity where you can make a difference, apply to one of our open positions today.

The post Building a Better Cyber Team appeared first on 躂圖AV.

]]>
AESS 2.0 and How Intelligence Drives Security /ecs-insight/blog/aess-2-and-how-intelligence-drives-security/ Wed, 20 Mar 2024 16:01:33 +0000 http://ecstech.flywheelstaging.com/?p=26653 躂圖AV Vice President of DoD Cybersecurity Mark Maglin talks about the Army Endpoint Security Solution and the 2.0 improvements to come.

The post AESS 2.0 and How Intelligence Drives Security appeared first on 躂圖AV.

]]>

Listen to article:

Mark Maglin

Vice President of
DoD Cybersecurity

Were protecting one of the largest, most complex networks in the world, says 躂圖AV Vice President of DoD Cybersecurity Mark Maglin, for an incredibly important mission that our nations adversaries are attacking every single day.

Mark is talking about the Army Endpoint Security Solution (AESS) that 躂圖AV has provided for U.S. Army Cyber Command (ARCYBER) since 2016. The key to AESS success is sharing cyber threat intelligence (CTI) in near real time to protect the Armys assets and inform our partners of new threats.

The zero trust architected AESS protects 800,000 endpoints across the Armys global infrastructure. It blocks 1.5 million malicious events per month. Its the only true managed security service used by the U.S. Army. And its the only deployed, fully integrated cybersecurity solution that offers all the endpoint security and management capabilities required by Joint Force Headquarters DoD Information Network.

In the fall of 2022, ARCYBER awarded 躂圖AV a five-year recompete contract, beginning the 2.0 phase of AESS development. We sat down with Mark to ask a few questions about AESS and where its 2.0 improvements are taking Army cybersecurity.

Q: Can you describe some innovations and improvements AESS 2.0 will bring?

A: For starters, were adding another endpoint tool, Microsoft Defender. Our strength is our working with key technology partners to integrate and deliver the latest and best tool sets available, because no one tool does everything.

We take all these powerful tools Elastic, ThreatQuotient, Forescout, Trellix, Tychon, and others integrate them into a coherent solution, automate it, and deliver it as a managed service. So ARCYBER never needs to worry about managing individual tools or policies.

All our tools are cyber sensors. Our integrated solution collects, normalizes, correlates and instantaneously shares CTI from each one of the sensors. So, the AESS can isolate a single malicious detection and use that CTI to protect every endpoint across the global enterprise automatically and in real time.

Beyond CTI, we enumerate every endpoint for cyber hygiene: policy compliance, configuration, and vulnerabilities. That way, as soon as a new attack and its method are known, we know which endpoints may be vulnerable.

During a significant cyber event, no single entity has all the information, authorities, or capabilities to enable comprehensive action. Creating shared situational awareness is primarily a policy, information, and analytics challenge, not just an IT challenge.

Network visibility and analytics improvements are also in the works. Were creating a unified asset management system that will provide more visibility of network devices and enhanced reporting. This will improve compliance, threat detection, investigation, and response.

Were also integrating with the Armys big data platform, Gabriel Nimbus, and other DoD data platforms. This will enrich the Armys long-term threat intelligence analysis.

Q: Youve said AESS is all about the data. Can you elaborate on that?

A: Its all about protecting the Armys data. And its also about the CTI generated by our security tools. By gathering and analyzing that threat data, we gain visibility and can better protect endpoints. That’s why weve built AESS from these tools. We know how to get the data from them and gain visibility into every asset on the Armys networks and everything thats happening on those networks.

Data analytics tell us things we wouldnt otherwise know, such as where the vulnerabilities are. Without this capability, youre just playing Whac-a-Mole on security events. But with it, we know where to look and how to understand and prioritize vulnerabilities and fix things before we have an intrusion.

Data enables us to detect and automatically protect against threats across the Armys networks in the short term. Finally, by sharing our threat data with other Army platforms, well help uncover cyber threats and vulnerabilities through long-term analytics.

We are also working with other DoD agencies such as Joint Special Operations Command, Central Command, and others to automatically share CTI discovered from novel malicious events. This is a first, and I think we are the only ones sharing across agency networks. There is a technical challenge which we have solved, but it is really a policy challenge, too. It is the right thing to do. We need to crowdsource our CTI.

Q: Is there anything else about the future of AESS that youd like to leave us with?

A: AESS will continue to evolve, and 躂圖AV will continue to draw on our companys massive array of skills and experience to maintain and develop AESS. Internal knowledge sharing across 躂圖AV projects will always support the development of the Army Endpoint Security Solution so long as we have the privilege of providing the Army with this managed security service.

The post AESS 2.0 and How Intelligence Drives Security appeared first on 躂圖AV.

]]>
Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard /ecs-insight/blog/enabling-operational-visibility-and-reducing-federal-cyber-risk-with-elastic-and-the-cdm-dashboard/ Wed, 28 Feb 2024 11:00:44 +0000 http://ecstech.flywheelstaging.com/?p=23062 Joanna Dempsey, vice president of CISA portfolio, and Keith McCloskey, vice president of Justice & Homeland Solutions, break down how the CDM dashboard ecosystem, powered by Elastic, empowers federal threat hunters like never before.

The post Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard appeared first on 躂圖AV.

]]>
By Vice President, CISA Portfolio
and Vice President, Justice & Homeland Solutions, CTO

[This article complements a talk given by Joanna Dempsey, vice president of CISA portfolio at 躂圖AV, at ElasticON 2023. to view Joannas full presentation on YouTube.]

For the past three years, 躂圖AV has been working with the Cybersecurity and Infrastructure Security Agency (CISA) Continuous Diagnostics and Mitigation (CDM) program to build, deploy, and operationalize a whole new CDM dashboard ecosystem. Our goal has been realizing actionable operational visibility for federal agencies an unprecedented level of visibility and access to cyber data, at scale. The CDM Dashboard ecosystem improves how incident responders find and remediate threats and vulnerabilities, enabling agencies to better protect their assets.

To achieve this, weve partnered with Elastic, whose suite of open-source products enables real-time search, analysis, and visualization of data regardless of format. And while the original CDM mission to help federal agencies protect their networks remains strong, the CDM dashboards, built on Elastic, are enabling a game-changing level of visibility and insight. After exploring how, well look at a scenario illustrating how operational visibility in the federal government could greatly improve our nations cybersecurity.

The First Steps Towards Operational Visibility

First, we must recognize the impact of the 2021 Executive Order on cybersecurity, which did three critical things:

  • Removed many of the governments barriers for interagency data sharing.
  • Directed the improved collection and analysis of additional cyber-relevant data.
  • Prescribed a government-wide endpoint detection and response (EDR) capability, which has become a top priority for CDM.

This evolution of federal cyber requirements cleared a path for more effective collaboration across the federal civilian executive branch (FCEB) agencies a new direction that aligned perfectly with platforms like Elastic and the CDM dashboards.

The CDM Agency Dashboard is the first point at which all these vast data sets are aggregated so that we can efficiently scale federal cyber operations.

Starting at the bottom of this chart, we have a diverse and dynamic set of agency tools and sensors that satisfy a range of requirements for effective cyber hygiene on agency networks. Moving up a layer, the data from these tools and sensors is integrated and aligned to a common schema so that we can make sense of it at scale.

CDM and Operational Visibility

CISAs operational visibility strategy has two components:

  • Providing improved, contextualized visibility into an organizations mission.
  • Providing deeper insights into the risk posture of an organization and its assets.

The strategys goal is to connect people with the right contextualized and enriched data to help them make better decisions and reduce cyber risk. In the agencys view, the question operational visibility seeks to answer is:

How do we integrate the people, processes, and tools we need to automate the detection and remediation of the known, predict the known unknowns, and adapt to the unknown unknowns?

Lets focus on two key initiatives within CDM that enable CISAs operational visibility strategy: the government-wide deployment of EDR capabilities and a Host Logging Visibility pilot. The former has become a critical part of federal cyber programs, as EDR tools are generally very good at automating the detection and remediation of known bad things happening on an endpoint. The latter expands the data available to agency and CISA analysts in the CDM dashboard to include endpoint logs data which can be correlated at scale and with other CISA intelligence to improve threat detection and analysis.

Operational Visibility in Action

Now, lets walk through exactly how the CDM dashboards can help orchestrate an improved defense of agency networks.

Pretend youre a CISA cyber analyst tracking a particularly bad threat actor, Bad Baby Dingo, operating out of Australia. You receive intelligence that Bad Baby Dingo is targeting a common vulnerability and exposure (CVE) to launch a rare process that installs a malicious file on victims systems.

The process to install the file, which well call Creepy Koala, leaves behind clues specifically, logs that describe the process being launched and the file being installed. These process logs are captured on the endpoint and sent to the CDM dashboard for analysis and monitoring.

You log in to the CDM federal dashboard and run a search across the entire FCEB for the CVE that Bad Baby Dingo is exploiting. You get over 12,000 hits spread across 14 agencies, which would require a huge amount of labor to comb over. However, with the dashboard, you simply isolate the assets with the CVE, gaining insights into potential high value assets (HVAs) that could be impacted. Using this list as your input for another query, you identify potential indicators that the Creepy Koala process has been run. This time, your search leads you to 18 devices split between just two agencies, with HVA context to help inform and prioritize your response.

At this point, you have evidence that Bad Baby Dingo has breached two federal networks with an identified and prioritized set of assets. You pivot to agency As EDR console and isolate 10 of the impacted devices. You dive deeper into the systems to confirm what you suspected a Creepy Koala process has been run on the endpoints. You help the agency security operations center (SOC) prioritize their response to block the process, remove the bad files, and create rules within the EDR to block the process in the future. You work with your peers across CISA to distribute alerts and detection rules to all agencies. You now have what you need to render Creepy Koala effectively harmless against the entire federal government.

躂圖AV + Elastic Deliver

Ultimately, Elastic-powered CDM dashboards empower incident responders like never before. With a broader and more enriched set of cyber-relevant data, coupled with a more unified approach to how we consume, manage, and analyze that data, our nations defenders can stop reacting to the problem and start being more proactive in defending their missions.

Interested in learning about our CDM Program?

Reach out and talk to our experts today!

The post Operational Visibility: Reducing Federal Cyber Risk with Elastic and the CDM Dashboard appeared first on 躂圖AV.

]]>
Optimizing SecOps with Elastic /ecs-insight/blog/optimizing-secops-with-elastic/ Tue, 27 Feb 2024 05:01:06 +0000 http://ecstech.flywheelstaging.com/?p=23693 Dave Howard, director of the Cyber Threat Analysis Center at 躂圖AV, and Luke Gigiano, cyber threat analyst, explore how our analysts employ many of 楚梭硃莽喧勳釵s key capabilities to optimize our Security Operations.

The post Optimizing SecOps with Elastic appeared first on 躂圖AV.

]]>
Go to video

The ever-evolving threat landscape requires cybersecurity analysts to detect, analyze, and respond to threats quickly, accurately, and at scale. At 躂圖AV, the Cyber Threat Analysis Center (CTAC), our premier threat analysis and advanced analytics capability, serves as the tip of the spear in threat monitoring, analysis, detection, and response.

Critical to providing powerful solutions to our customers are our partnerships with emergent security technologies such as Elastic, the leading platform for search-powered solutions.泭 We leverage Elastic security information, event management, and analytics solutions to outpace adversaries, operate at scale, and act decisively. 躂圖AV has more Elastic-certified engineers than any other organization (aside from Elastic itself), and we manage one of the worlds largest Elastic environments.

The post Optimizing SecOps with Elastic appeared first on 躂圖AV.

]]>
How to Make Your Resume Stand Out /ecs-insight/blog/how-to-make-your-resume-stand-out/ Thu, 04 Jan 2024 12:00:09 +0000 http://ecstech.flywheelstaging.com/?p=13257 This how-to article provides job seekers with resume writing tips from 躂圖AV recruiting professionals.

The post How to Make Your Resume Stand Out appeared first on 躂圖AV.

]]>

Listen to article:

There are of job seekers looking for new opportunities every day. If youre one of them, chances are youve submitted a resume to a recruiter and not heard back. In fact, you may need to submit before you secure an interview.

So, how can you make your resume stand out in a crowded and competitive job market? We spoke to three of our recruiters to get some tips on the best ways to get your resume noticed.

Jessica Rutkoski
Corporate Recruiter

Writing your resume can be daunting, as it is the key that opens the door to new opportunities. When writing your resume, pay attention to details and be as detailed as possible with the description of your current and past positions.

Recruiters and hiring managers see only your resume or LinkedIn profile before making the decision to reach out to you. By making sure you have all the important details in your resume or LinkedIn profile, you can exponentially increase your chances of being contacted. Details such as clearances, certifications, job titles, and dates are all key details that hiring managers and recruiters search for in resumes.

Adding the specific tools and technologies you have used helps hiring managers and recruiters find you in the sea of applicants. Many positions in the technical field are looking for someone with experience in the specific technologies the team is currently using. Always make sure to tailor your resume to each position you apply for, to highlight what makes you a qualified applicant based on the job description.

“When writing your resume, be as detailed as possible with the description of your current and past positions.”

Jessica Rutkoski
Corporate Recruiter

Michael Pang
Recruiting Manager

When writing your resume, it is absolutely beneficial to describe the scale and scope of your current environment to help the recruiter who champions your qualifications during the submittal process.

If you are currently responsible for managing hundreds of terabytes of data with large ingests of log data on a daily basis, thats worth expanding on. The same holds true for topics like number of end users, endpoints, transactions, microservices, nodes, and servers. Adding this information to your resume will allow the technical team to correctly grasp your ability to handle similar complexity, and it will provide comfortable talking points during your interview.

Keep job titles and responsibilities as specific as possible for each role listed on your resume. If you have a background in front-end development with some exposure to networking and you are applying for a developer position, you should emphasize your development experience to cater to the requirements of that role. I recommend having different resumes for different types of roles so that you can include relevant language and key words.

Steven Mashinski
Senior Recruiter

If youre transitioning from military service to civilian work, youll want to translate all the military terms and jargon on your resume to language that civilian recruiters can understand. Adding leadership terms and a short description of collaboration with highly ranked officials, along with a list of both hard and soft skills, will create an impressive resume.

Clearance status is a major advantage that veterans hold over civilians. Make sure that hiring teams dont have to search too long for this information. List it in a clear and obvious place on your resume. To a potential employer, having a clearance means they get the benefit of an employee who is trusted to work with privileged information without incurring the cost and time it takes to qualify and train one.

Do your research on companies to make sure they value the experience you can bring them. If they openly display a positive veteran environment that will provide you with mentors, that could be a great company to work for.

At 躂圖AV, were growing our team of cybersecurity, data and artificial intelligence, and IT Operations professionals. If youre looking for an exciting new opportunity at an industry-leading organization, 躂圖AV may be the next step in your career journey.

Meet the challenge and submit your resume today.

The post How to Make Your Resume Stand Out appeared first on 躂圖AV.

]]>
Honoring Our Veterans /ecs-insight/blog/honoring-our-veterans/ Thu, 09 Nov 2023 16:00:29 +0000 http://ecstech.flywheelstaging.com/?p=13204 This Veterans Day, we spoke with a few of our 躂圖AV veterans about skills they gained during their time in the service.

The post Honoring Our Veterans appeared first on 躂圖AV.

]]>

This Veterans Day, we spoke with our veterans to learn more about their time in the service and the skills they gained that serve them in the corporate world. Their dedication, exceptional teamwork, and commitment to the mission drive 躂圖AV to deliver on government and commercial projects and programs day-in and day-out. With over , 躂圖AV is committed to serving these men and women as a V3 (Virginia Values Veterans) partner.

For those men and women transitioning from the military to the corporate world, finding fulfillment can be a challenge. Service members are always working towards the success of their mission and their team, which can be difficult to find in a run-of-the-mill position. that when your work enables you to earn your success and serve others, you are more likely to find fulfillment in your career.

James Ritchie, Senior Program Operations Deputy/Tech Lead

Branch: United States Army
Years of Service: 2003-2011
Rank Achieved: Staff Sergeant

What is one great lesson from the military that you rely on in civilian life now?

One team, one fight!

While serving, it was important to take a step back and see where other improvements could be made, regardless of direct individual task. While actively engaging an attacking force, I saw that my Forward Observer (FO) was having a hard time finding Positive Identification (PID). Even though my direct task was to operate the 120mm Mortar System as the Fire Direction Center, we could not accurately engage due to the FOs inability to capture targets.

As a response, I took the Lightweight Handheld Mortar Ballistic Computer (LHMBC) and my radio and ran to an elevated position to get a better view of the battlefield. From this position, I was able to assist the FO with points of reference so he could perform his task and get us on target to defend the Combat Outpost. This story crosses over to my civilian/professional life because it provided me with an understanding that sometimes, we have to take a step back to see how we can help improve other processes outside of our scope to bolster mission success.

Bryan Snow, Program Manager AI/ML Delivery & Ops

Branch: United States Marine Corps
Years of Service: 2009-2017
Rank Achieved: Sergeant

What is one great lesson from the military that you rely on in civilian life now?

A lesson I learned from serving: In the Marine Corps we have a set of leadership traits that every Marine can rattle off without hesitation which is the acronym . Three of these traits I have always gravitated to are Judgment, Dependability, and Unselfishness. When being brought up as a young, enlisted Marine, it was instilled in me to always make decisions while remaining calm no matter the situation using reason and logic.

Once that decision is made, you have to be dependable to accomplish the task and ALWAYS remain unselfish to give credit where credit is due to your teammates. I believe I still practice these traits daily, and it is a large factor of my success throughout my continued education and here at 躂圖AV coming in as a Trainer in 2019 and now as a Program Manager. No matter the position, these traits are hugely beneficial in guiding someone to executing as a leader.

Joe Lemanek, Senior Capture Manager

Branch: United States Navy
Years of Service: 2002-2022
Rank Achieved: Lt Cdr (Mustang)

What is one great lesson from the military that you rely on in civilian life now?

Take care of your people, and they will accomplish the world with you.泭

This advice guided me throughout my career; from my early enlisted ranks all the way up through when I retired from the military as a LCDR and has continued into my civilian career. On my deployments to the far corners of the world, often I would be with a small team of folks where all we had was each other. We all understood the mission and how each persons skills contributed to accomplishing that mission.

What bonded us was the ability to understand this: underneath the uniform, we were people with individual goals, stressors, feelings, and thoughts. Taking the time to get to understand your folks, learning what drives and motivates them, knowing what worries them, and putting effort into forging a personal connection, is the true sign of a good leader.

Once that relationship is built at the individual level and trust builds within the team, you realize that together, you can accomplish anything. Often, overall success will be a direct result of that trust and those relationships and not simply because of the “leader’s” rank, title, or position of authority.

Neil Hamlett, Cybersecurity Data Architect

Branch: U. S. Navy
Years of Service: 1985-2007
Rank Achieved: Commander (O-5)

What is one great lesson from the military that you rely on in civilian life now?

I was assigned to from 2002-2004. Created by Congress, INSURV monitors the material conditions of Navy warships and administers material inspections (MIs) of each ship once every three to five years.

I served as senior inspector for Command, Control, Communications, and Intelligence (C3I) systems. In this role, I managed inspection standards for those systems, trained and supervised other C3I inspectors, and analyzed trends in inspection results. I also personally performed material MIs on nearly 30 individual warships, including more than one-fourth of the entire inventory of .

I began to notice a trend about halfway through my two-year INSURV assignment. Specifically, material condition varied widely from ship to ship. Moreover, “strong” ships tended to remain “strong” throughout their lifecycles, and “weak” ones tended to stay “weak”.泭 On average, each ship receives the same basic tangible inputs: human capital (sailors), operations and maintenance support, capital improvements (periodic major upgrades). Despite this, INSURV found dramatic differences between individual warships’ material conditions.

What appeared to be happening? Intangibles determine an individual warship’s mission performance and material maintenance at least as much as measurable inputs. What intangible? Culture, “command climate” in military terms, strongly influences whether an organization effectively utilizes its tangible inputs. Furthermore, culture takes on a momentum of its own that is extremely hard to change. A few years later, while a strategy and analytics consultant with IBM, I corroborated this perspective through a project to analyze INSURV’s entire inspection-history database.

What lesson do I draw? Introducing new technology into a client’s organization doesn’t improve efficiency and effectiveness much if other bigger issues like culture, strategy, operations, and organization are not also addressed. My current career phase focuses on helping clients improve through smarter use of data and analytics. Rather than jumping right in and I first cultivate an understanding of my clients’ missions and .

, the “father” of modern business consulting, famously observed that “culture eats strategy for breakfast”. No amount of fancy statistical calculations, business analytics, machine learning, or artificial intelligence helps much .

With contracts across the government, 躂圖AV work impacts civilian and military lives every day. Projects like M-SHARP and GATES support combat readiness and transport people and cargo across the world. Veterans who have worked for many years to support critical missions around the world are eager to find a career that makes a difference. If you are transitioning from the military, 躂圖AV is here to help you find your next challenge. Reach out and apply today.

The post Honoring Our Veterans appeared first on 躂圖AV.

]]>
躂圖AV Experts Speak: Best Practices for Cybersecurity Awareness /ecs-insight/blog/ecs-experts-speak-best-practices-for-cybersecurity-awareness/ Wed, 01 Nov 2023 11:00:10 +0000 http://ecstech.flywheelstaging.com/?p=21077 躂圖AV experts weigh in with their knowledge, tips, and best practices around cybersecurity awareness. See their hot takes here.

The post 躂圖AV Experts Speak: Best Practices for Cybersecurity Awareness appeared first on 躂圖AV.

]]>

Cyber-attacks are growing increasingly sophisticated, and organizations of all sizes must secure an ever-growing number of remote access points. Being aware of your cyber hygiene and maturity level is critical.

See below as 躂圖AV experts weigh in with their knowledge, tips, and best practices around cybersecurity awareness, including enabling multi-factor authentication, detecting and reporting phishing, and practicing strong password security and management.

What is Multi-Factor Authentication and how does it work?

Keith McCloskey

躂圖AV Vice President, Homeland Security Solutions

Why is Multi-Factor Authentication important for cybersecurity?

Keith McCloskey

躂圖AV Vice President, Homeland Security Solutions

Why are strong, unique passwords so important for modern cybersecurity?

Baily Brooks

躂圖AV ARC Manager

How can password managers enhance our modern cybersecurity?

Baily Brooks

躂圖AV ARC Manager

What is Phishing? Why is it important for employees to be able to recognize and report it?

Dave Howard

躂圖AV Director, Security Operations

How cybersecurity aware are you? 躂圖AV offers a variety of managed, scalable solutions to suit your unique needs, as well as the expertise to help you minimize risk and ensure cybersecurity compliance. Reach out today if youre ready to better protect your organization and stay Cyber Smart out there!

TALK TO OUR TEAM

The post 躂圖AV Experts Speak: Best Practices for Cybersecurity Awareness appeared first on 躂圖AV.

]]>