Listing Description
Location: Remote/ Herndon, VA (currently 100% remote, must be local)
Category: Technology
Schedule (FT/PT): Full Time
Travel Required: N/A
Shift: Standard Hours
Potential for Telework: Yes
Clearance: Secret
Group: DHS
Description:
We are seeking a strong Security Content Visualization Expert with at least three years of experience working as a senior analyst within Medium-Large Enterprise Security Operations Centers and has specialized in building content for SIEM’s such as ArcSight, Splunk, or the ELK Stack. The perfect candidate will have multiple SIEM Certifications and have exceptional experience in analysis and data visualization and representation.
This is a SIEM content developer position, not a SIEM engineering or admin role.
Requirements:
• Designing, customizing, and configuring SEIM apps, dashboards, and visual aides to mature and improve medium-large Security Operating Centers
• Assisting with the development of advanced reporting & Visualizations to meet the requirements of SOC and external Stakeholders
• Configuring, designing, and testing security dashboards and alerting within SEIM technologies to include data modeling, custom alert notification, and dash-boarding supporting the full lifecycle of content (conception, creation, testing, documentation, implementation, tuning)
• Analyzing, trending, and filtering of security log data from many disparate security devices to include FW’s, IPS/IDS, Host, Load Balancers, and other security / monitoring solutions
• Performing advanced Searching within large-scale SEIM’s and implementation of custom dashboards.
• Optimizing security content in enterprise SEIM’s
• With Cyber Kill Chain and synthesizing the attack life cycle
• SOP development and updating along with training new SOP’s
• Implementing SOC processes and SOP’s
• Mentoring Junior and mid Analysts
• With developing custom SPL using macros, lookups, and network signatures
• Enterprise logging solutions, including application, OS, and security device logging
• Identifying/creating and utilizing IOCs
• Utilizing Network traffic indicators to identify anomalous user activity associated with lateral movement within an enterprise Utilizing regex for direct pattern matching
• Utilizing network security tools and SIEM technologies
• Network ports and protocols (TCP, UDP, HTTP, SMTP, DNS)
• Intel frameworks to include cyber kill chain and Mitre ATT&CK
• APT capabilities and ability to implement appropriate detection measures
• Custom log parsing
• Visualizations for displaying data to include anomalous network traffic
Education and Certifications:
• BA or BS degree, preferably in a technical area One of the following certifications is required: CISSP GCIH
• GCFA GPEN GWAPT GCIA Or equivalent
Security/Clearance Requirements:
• Must be a US citizen and pass a background investigation
• Must have Secret Security Clearance
Pay and Benefits:
Pay and benefits are fundamental to any career decision. Our client crafts compensation packages that reflect the importance of the work being done and enable customers to achieve the true value you bring to the program and the company. Employment benefits include competitive compensation, Insurance, Health, and Wellness programs, Paid Leave, Retirement, Short-Term and Long-Term Disability insurance, 529 program access, and more. For more details, please contact your recruiter or first-line manager.
Client and Recruiter Information:
Our client is an award-winning cyber-focused data science solutions and services leader working to accelerate and enable our customer's success as they work to solve the world’s toughest challenges in the defense, intelligence, civil, and health markets. Owing to the classified nature of their work, we hold back this information from public postings.
We are proud to be the primary firm providing recruiting services for this exceptional cybersecurity firm.
Commitment to Diversity:
All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. We will also consider employment-qualified applicants with criminal histories consistent with relevant laws.
Securing Your Data:
Beware of fake employment opportunities using our name. We will never ask you to provide payment-related information during any part of the employment application process nor will we ever advance money as part of the hiring process. Further, we will only communicate with you through emails generated via our primary domain, never from free commercial services (e.g., Gmail, Yahoo, Hotmail) or via WhatsApp or Telegram, etc. If you received an email purporting to be from us that asks for payment-related information or any other personal information, and you are concerned about its legitimacy, please make us aware immediately by reaching out to the Human Capital Manager you are working with.
If you believe you are the victim of a scam, contact your local law enforcement and report the incident to the U.S. Federal Trade Commission.
Listing Details
- Citizenship: Not Provided
- Incentives: Not Provided
- Education: Not Provided
- Travel: Not Provided
- Telework: Not Provided