drjobs SIEM Engineer العربية

Employer Active

The job posting is outdated and position may be filled
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Job Description

Location: Annapolis Jct MD
Category: SIEM (Security Information and Event Management) Engineer / Splunk Certified Admin
Travel Required: No
Remote Type: No
Clearance: Top Secret/SCI w/ FS Polygraph

Job Summary / Primary Responsibilities

The selected candidate will be responsible for configuring the collection parsing correlation and visualization of events for a critical operational system. She/he will demonstrate strong skills in system administration log management event correlation and threat detection and will support building and maintaining a system that analyzes collected data and derives facts inferences and projections to determine if the systems being monitored are operating normally. The individual will work on a team responsible for configuring the systems which support analysts and endusers. The successful candidate will support the collection and extraction of data used to refine existing and new reports analytics and dashboards and will be involved with the drafting and creation of reports and dashboards based on enduser requirements. She/he will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data.

Basic/Required Qualifications

  • At least 8 years of related experience.

At least 2 years of experience with one or more of the following: StealthWatch TripWire Zenoss ArcSight Splunk.

Experience in design implementation and support of Splunk core components including: indexers forwarders search heads and cluster managers.

Experience with configuration and administration of Splunk ingestion and forwarding for new and existing applications and data.

Experience with troubleshooting Splunk dataflow issues between the various Splunk core components.

Experience configuring and deploying data collection for a variety of operating systems and networking platforms.

Experience creating Dashboards and Analytics within SIEM tools.

Experience working with monitoring systems supporting auditing incident response and system health.

Understanding of networking components and devices ports protocols and basic networking troubleshooting steps.

The ability to troubleshoot issues with log feeds search time and field extractions.

The ability to troubleshoot problems related to data solutions.

Preferred Qualifications

Bachelors Degree in Computer Science Engineering Information Assurance or a related discipline.

Network Security Operations Center (SOC) experience.
Experience and talent in data visualization.

Experience creating workflows for Incident Response within a SIEM Tool.

Security Certification.

GIAC Certified Incident Handler Certification.

GIAC Cyber Threat Intelligence Certification.

Cybersecurity certifications.

Formal SIEM training.

Experience working on an Agile team/program.

Employment Type

Full Time

Company Industry

Key Skills

  • ASP.NET
  • Health Education
  • Fashion Designing
  • Fiber
  • Investigation
Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.