Why work at Kivu?
Our employees become part of a team of experts who cover a wide range of interesting and challenging projects. By working at Kivu, you’ll stay on top of cutting edge technologies, and you will realize the personal satisfaction of making a real difference to the businesses we serve. We will always value your contributions, and we will do our best to make it possible for you to balance an exciting professional and personal life.
We Invest in Our People
As a member of the Kivu team, you will:
- Work with top-tier colleagues
- Learn the latest technologies
- Develop your leadership skills
Kivu’s Culture
Kivu has developed an organizational culture that empowers individuals to do their best work. Our team members are highly technical, have an understanding of what makes people tick, and a sense of humor is always appreciated. They have the ability to rapidly shift gears between a technical and investigative mindset, have excellent research skills, and are able to analyze and synthesize data from different sources.
Kivu’s Values
Kivu’s has ten core values: Client Service, Professionalism, Fairness, Integrity, Respect, Trust, Diversity, Excellence, Teamwork and Entrepreneurship. These values permeate everything we do, and every case we handle. Read more about Kivu Values (PDF)
Employment Benefits
In order to attract and retain some of the best and brightest in the industry, Kivu offers highly competitive compensation and benefits programs. These include:
- Substantial training (both in-house and at nationally recognized institutions)
- Time off plan that includes vacation, sick and holiday time
- Competitive medical and dental benefits
- Bonus program
- 401(k) Retirement Plan (including an employer match)
- Commuter Plan
Job openings
Become a part of the Kivu team
Please email a resume and detailed cover letter (outlining how you fit the position’s requirements) to: careers@kivuconsulting.com
IT Analyst - Denver, CO
Kivu is a cyber security firm that specializes in incident response and post-breach remediation, working with insurance companies and law firms to provide these services to end-clients. With eleven offices spread across the US, Canada, UK and Europe, we are a rapidly growing organization. We are currently looking for the following:
IT Analyst
Core Focus
The ideal candidate is self-directed a passion for technology, collaboration, and creative problem-solving. The IT Analyst will actively contribute to meaningful projects and work closely with IT Management and senior leadership. The candidate must have strong communication skills, both written and oral and have excellent customer service skills.
Summary of Responsibilities
- Provide Tier II support on issues escalated from help desk regarding support to employees for computer equipment, applications, and cloud systems.
- Assist with firewall changes, deployment of virtual machines, storage changes, and backups.
- Assist with new user creation and departures, computer imaging.
- Interact with hardware and software vendors on an ongoing basis for repair and problem resolution.
- Author appropriate documentation, records and procedures relating to users, equipment operations, software changes, maintenance and problems encountered, with periodic review to insure they are current.
- Evaluate current methods of software and hardware use, recommend improvements and efficiencies.
- Lend IT support in areas such as cybersecurity, programming, analytics, and data center management.
- Rotating on call schedule providing evening and weekend coverage.
Qualifications and Required/Preferred Experience
- Degree in computer science or related field, or equivalent experience and certifications (MCSA,MCSE, CCNA, etc.)
- Microsoft Office 365 – User Administration, Exchange Online, Sharepoint Online, Flow, OneDrive, Teams, Skype.
- Active Directory, Azure, Intune.
- Hyper V\VMWare virtual machine administration.
- Sonic Wall and Fortinet Firewall configuration and troubleshooting. (VPN)
- Networking, switching, VLANS. (TCP/IP, HTTP, HTTPS, SFTP, DHCP)
- Dell Servers and Storage administration. (SAN, NAS, RAID)
- Software installation and deployment.
- Exposure to Cybersecurity best practices and procedures.
- Have effective interpersonal skills to communicate with organization staff and department managers to accomplish goals for productivity and organization wide quality of service.
- Ability to work well individually and in teams
- Strong work ethic and attention to detail
About Kivu Consulting, Inc.
Kivu Consulting is an international computer forensics and incident response firm founded in 2009. Kivu offers services in data breach response, risk assessments, and computer forensics. Kivu’s digital forensic investigators and incident responders are experienced in protecting organizations against compromise of data, theft of trade secrets and unauthorized access to data.
Become a part of the Kivu team
Please email a resume and detailed cover letter (outlining how you fit the position’s requirements) to: careers@kivuconsulting.com
Digital Forensics & Incident Response Analyst - Washington DC, Denver, CO and Phoenix,AZ
The ideal candidate will have hands-on experience performing data breach response, in addition to knowledge in security risk assessments, reactive incident response, and computer forensics (ransomware is a plus). This person will carry out a high level of customer service and communication with clients around the country, deploying various technical, analytical, and legal tactics in a fast-paced environment.
Summary of Responsibilities
- Participate in engagements related to preemptive data breach response; analytic and reporting for litigation, data breaches, and regulatory response; workplace and employment issues, including theft of trade secrets, and; investigations related to network breaches/unauthorized access of data through computer forensics and incident response
- Deliver exceptional client services, including communicating with the client throughout the entire project lifecycle to better understand client needs
- Remain highly responsive and ensure all deadlines are met
- Perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration
- Engage with attackers directly to resolve cyber extortion incidents
- Participate in CSIRP development and gap analysis, tabletop exercises, incident response and computer forensics, and data breach response with best practices
- Experience with scan/assessment tools such as Metasploit, Nessus, Burp Suite, Core Impact, and/or others
- Handle web application exploitation, server and client-side attacks, and protocol subversion
- Perform IT System and Network Audits; write technical reports
- Remain abreast of computer networks, hardware, communications, and connectivity
Qualifications and Required/Preferred Experience
- 1-3 years of relevant experience described above; prior experience consulting in the private sector is a major plus
- Bachelor’s degree or Master’s degree in Cyber Security, Computer Science, Information Security, or other related fields is preferred
- Certifications: SANS, EnCE, CISSP, or other relevant security certifications are preferred
- Familiarity with Windows, Linux, Mac, and UNIX systems
- Proficient in one of more of the following languages: C, C++, Visual Basic, Python, Ruby, JavaScript, Perl
- Knowledgeable of encryption and encoding methods, communication protocols, and algorithms
- Enthusiastic about delivering the highest quality results to clients on time and on budget
- Able to triage multiple cases simultaneously
- Self-driven to deliver the highest level of results for clients
Senior Digital Forensics & Incident Response Analyst - Washington DC, Denver CO, and Phoenix AZ
Summary of Responsibilities
Participate in engagements related to preemptive data breach response; analytic and reporting for litigation, data breaches, and regulatory response; workplace and employment issues, including theft of trade secrets, and; investigations related to network breaches/unauthorized access of data through computer forensics and incident response
- Deliver exceptional client services, including communicating with the client throughout the entire project life cycle to better understand client needs
- Remain highly responsive and ensure all deadlines are met
- Perform data breach response, cyber risk/security assessments, and remain involved in phases such as penetration testing, vulnerability scanning, and log configuration
- Engage with attackers directly to resolve cyber extortion incidents
- Participate in CSIRP development and gap analysis, tabletop exercises, incident response and computer forensics, and data breach response with best practices
- Experience with scan/assessment tools such as Metasploit, Nessus, Burp Suite, Core Impact, and/or others
- Handle web application exploitation, server and client-side attacks, and protocol subversion
- Perform IT System and Network Audits; write technical reports
- Remain abreast of computer networks, hardware, communications, and connectivity
Requirements
- 2-4 years of relevant experience described above; prior experience consulting in the private sector is a major plus
- Bachelor’s degree or Master’s degree in Cyber Security, Computer Science, Information Security, or other related fields is preferred
- Certifications: SANS, EnCE, OSCP/OSCE, or other relevant security certifications are preferred
- Familiarity with Windows, Linux, Mac, and UNIX systems
- Proficient in one of more of the following languages: C, C++, Visual Basic, Python, Ruby, JavaScript, Perl
- Knowledgeable of encryption and encoding methods, communication protocols, and algorithms
- Familiarity with NIST frameworks
- Enthusiastic about delivering the highest quality results to clients on time and on budget
- Able to triage multiple cases simultaneously
- Self-driven to deliver the highest level of results for clients
Threat Analyst - All Locations
Threat Analyst
Cyber threats are rising in both volume and sophistication every day. Building next generation capabilities for threat detection and response is not feasible for many organizations. However, Kivu’s Managed Security Services are designed to help bridge this gap by delivering advanced detection and response as a service, thereby removing the complexity and cost of building an in-house next generation security operation.
For security analysts it means working in an organization to leverage existing toolsets that provide automation and orchestration in a DevSecOps environment to keep the role exciting and challenging.
The Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. The Threat Analyst will work closely with our SOC Engineers and Program Architects to service Kivu Clients.
Summary of Responsibilities
- Analyze, document and report on potential security incidents identified in customer environments
- Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
- Act as a coordinator for security events that require urgent response, containment and remediation
- Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
- Familiarity with Elastic and Splunk SIEM
- Perform knowledge transfers, document and train clients regarding mitigation of identified threats
- Provide ongoing recommendations to other MSS peers and customers on tuning and best practices
- Actively research current threats and attack vectors being exploited in the wild
- Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
Qualifications
- Experience and Skills (General):
- One or more years of full-time professional experience in the Information Security field
- Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment
- Excellent time management, reporting, and communication skills
-
- Ability to generate comprehensive written reports and recommendations
- Write professional emails
-
- Strong customer skills
- Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
- Shift flexibility, including the ability to provide on call support when needed
- Ability to work greater than 40 hours per week as needed
- Ability to travel occasionally for key events or meetings
- Ability to act as a part-time on-call escalation point for security incidents
- Must be located within a reasonable commute of a WeWork or Kivu facility
- Must have dedicated, stable internet access at place of residence
- Experience and Skills (Technical)
- Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
- Queue management
- Data analysis using SIEM, Database tools, and Excel
- Experience troubleshooting security devices and SIEM
- Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
- Familiarity with SOAR tools
- IDS monitoring/analysis with tools such as Sourcefire and Snort
- Experience with SIEM platforms preferred (Elastic/Splunk) a plus
- Familiarity with web-based attacks and the OWASP Top 10 at a minimum
-
- Attack vectors and exploitation
- Mitigation
- Direct (E.g. SQL Injection) versus indirect (E.g. cross-site scripting) attacks
-
- Familiarity with SANS top 20 critical security controls
- Understand the foundations of enterprise Windows security including:
-
- Active Directory
- Windows security architecture and terminology
- Privilege escalation techniques
- Common mitigation controls and system hardening
-
- Network and Endpoint Detection and Response tool experience
-
- Experience in monitoring at least one commercial EDR solution. Endgame experience a plus.
- Ability to identify common false positives and make suggestions on tuning
-
- Malware
-
- Understanding of root causes of malware and proactive mitigation
- Propagation of malware in enterprise environments
- Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
- Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware”
- Experience with malware protection tools such as Endgame a plus.
- Understanding of malware mitigation controls in an enterprise environment.
-
- Understanding of Network Based Attacks / System Based Attacks
- Familiarity with the NIST CSF and MITRE ATT&CK Frameworks
Preferred Qualifications
- Experience working with Incident Ticketing Systems (ServiceNow preferred.).
- General security knowledge (GCIA, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, OSCP or other security certifications).
- CCNA, CCDA, CCSA, CCIE, CISSP, CEH, or MCSE.
- Managed Security Service provider experience
Become a part of the Kivu team
Please email a resume and detailed cover letter (outlining how you fit the position’s requirements) to: hr@kivuconsulting.com
Senior Threat Analyst - All locations
Senior Threat Analyst
Cyber threats are rising in both volume and sophistication every day. Building next generation capabilities for threat detection and response is not feasible for many organizations. However, Kivu’s Managed Security Services are designed to help bridge this gap by delivering advanced detection and response as a service, thereby removing the complexity and cost of building an in-house next generation security operation.
For security analysts it means working in an organization to leverage existing toolsets that provide automation and orchestration in a DevSecOps environment to keep the role exciting and challenging.
The Senior Threat Analyst will provide intrusion/incident monitoring and detection utilizing customer provided data sources, audit and monitoring tools at both the government and enterprise level. The Threat Analyst will work closely with the Incident Response, SOC Engineering, and Customer Experience teams to service Kivu Clients.
Summary of Responsibilities
- Analyze, document and report on potential security incidents identified in customer environments
- Work with partners to maintain an understanding of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets
- Act as a coordinator for security events that require urgent response, containment and remediation
- Provide analysis on various security enforcement technologies including, but not limited to SIEM, anti-virus, content filtering/reporting, malware prevention, firewalls, intrusion detection systems, web application firewalls, messaging security platforms, vulnerability scanners etc.
- Ability to recommend and implement content for Elastic and Splunk SIEM.
- Perform knowledge transfers, document and train clients regarding mitigation of identified threats
- Provide ongoing recommendations to other MSS peers and customers on tuning and best practices.
- Actively research current threats and attack vectors being exploited in the wild
- Actively work with associate analysts and perform investigations on escalations
- Ability to discuss security posture with multiple clients and make recommendations to better their holistic security approach
Qualifications
- Experience and Skills (General):
- Five or more years of full-time professional experience in the Information Security field
- Experience working in a Security Operations Center (SOC), Managed Security Service (MSS), or enterprise network environment
- Excellent time management, reporting, and communication skills
-
- Ability to generate comprehensive written reports and recommendations
- Write professional emails
-
- Coaching and training experience
- Previous experience as a point of escalation in a technical environment
- Customer interactions and creation of executive presentations
- Ability to troubleshoot technical problems and ask probing questions to find the root cause or a problem
- Shift flexibility, including the ability to provide on call support when needed
- Ability to work greater than 40 hours per week as needed
- Ability to travel occasionally for key events or meetings
- Ability to act as a part-time on-call escalation point for security incidents
- Must be located within a reasonable commute of a WeWork or Kivu facility
- Must have dedicated, stable internet access at place of residence
- Experience and Skills (Technical)
- Understanding of contemporary security architectures/devices such as firewalls, routers, switches, load balancers, remote access technologies, anti-malware, SIEM, and AV
- Queue and ticketing management
- Data analysis using SIEM, Database tools, and Excel
- Experience troubleshooting security devices and SIEM
- Ability to create and maintain content within SIEM environments and make recommendations to clients to better their visibility
- Experience with SOAR tools and developing playbooks
- IDS monitoring/analysis with tools such as Sourcefire and Snort
- Experience with SIEM platforms preferred (Elastic/Splunk) a plus
- Experience creating dashboards in SIEM, SOAR or visualization tools that are meaningful to clients at both a technical and business level
- Familiarity with web-based attacks and the OWASP Top 10
- Familiarity with SANS top 20 critical security controls
- Understand the foundations of enterprise Windows security including architecture and exploitation techniques.
- Network and Endpoint Detection and Response tool experience
-
- Experience in monitoring at least one commercial EDR solution. Endgame experience a plus.
- Ability to identify common false positives and make suggestions on tuning
-
- Malware
-
- Understanding of root causes of malware and proactive mitigation
- Propagation of malware in enterprise environments
- Familiarity with web-based exploit kits and the methods employed by web-based exploit kits
- Familiarity with concepts associated with Advanced Persistent Threats and “targeted malware”
- Experience with malware protection tools such as Endgame a plus.
- Understanding of malware mitigation controls in an enterprise environment.
-
- Deep understanding of Network Based Attacks / System Based Attacks
- Understanding of the NIST CSF and MITRE ATT&CK Frameworks and how to leverage them to drive improvements in SOC processes and communication.
Preferred Qualifications
- Experience working with Incident Ticketing Systems (ServiceNow preferred.).
- General security knowledge (GCIA, CISSP, CCSE, CISA, HBSS, NSA, CEH, Security +, OSCP or other security certifications).
- Vendor specific certifications from Splunk, Elastic, Cisco, Palo Alto, etc.
- Managed Security Service provider experience
Become a part of the Kivu team
Please email a resume and detailed cover letter (outlining how you fit the position’s requirements) to: hr@kivuconsulting.com
Filters
The filters are in here.