Content Developer (SIEM Cyber Security) with Security Clearance Law Enforcement & Security - San Antonio, TX at Geebo

Content Developer (SIEM Cyber Security) with Security Clearance

STS Systems Support, LLC.
(SSS) is seeking a Content Developer (SIEM Cyber Security) Requirements:
DoDD 8570.
01-M/8140.
01 I AT Level III CNDActive TS/SCIMore than 5 years of SIEM technology such as ArcSight, Splunk, and/or ELK.
More than 3 years with network traffic analysis, ports, and protocols.
BA/BS or MA/MSMore than five (5) years of SIEM technology such as Arcsight, Splunk and/or ELK.
Including, but not limited to, log handling, reports, filters, rule creation.
Extensive knowledge with IDS/IPS systems currently in use by the Department of Defense (DoD), Services, and Agencies (i.
e.
, Air Force, Navy, Army, DC3, DISA).
More than three (3) years of experience with Network Traffic Analysis; ports and protocols.
SANS GCDA or equivalent certification(s).
Extensive knowledge of MITRE ATT&CK framework, and its uses within the cybersecurity community (e.
g.
, Open Source projects)Desired:
Additionally, more than one (1) year of experience with Security, Orchestration, Automation, and Response (SOAR) platforms such as Phantom and/or Demisto.
Proficient in Python and PowerShell.
Duties:
Analyze DCO events.
Apply current industry SIEM best-practices.
Use security alerts correlated with log enrichment data to enhance the operator's ability to identify real attacks.
Establish security control effectiveness and monitor for unauthorized outbound connectionsCreate detections by analyzing log data across the enterprise.
(CDRL A007)Develop dashboards and visualizations to identify adversarial activity.
(CDRL A007)Use log data to establish and implement virtual tripwires for early detection.
Analyze and ingest security logs into the SIEM in order to optimize for performance of the SIEM.
Conduct designing, implementing, and testing of various SIEM solutions.
(CDRL A007)Create and support the creation of SIEM Use Cases and understand what alerts and log enrichment is necessary to meet the required acceptable false positive rate.
(CDRL A008)Create, test, and validate filters and rules.
(CDRL A007)Build and implement event correlation rules, logic, and content in the SIEM.
(CDRL A007)Tune SIEM event correlation rules and logic to filter out security events associated with known and well established network behavior, known false positives and/or known errors.
Analyze malware threats to develop behavior based detections that alert and/or prevent malicious activity.
Automate tasks in the SIEM using a common programming or scripting language.
Create scheduled and ad-hoc reporting with SEIM tools.
(CDRL A007 and A008)Create and maintain SIEM documentation.
(CDRL A008)Develop and execute a process to review and maintain SIEM resources such as rules, filters, lists, trends and reports.
Utilize SIEM to develop metrics collection, analysis, and create reports upon request.
Provide training to government personnel as requested.
Provide knowledge transfer of tools, processes and procedures to government personnel as requested.
Provide OJT to other contractor employees, military, and/or civilian personnel, and ensure continuity folders/working aids are updated at least once per quarter in order to ensure efficient transition when personnel rotate.
Maintain currency on latest industry trends and provide operational reports/assessments for development of tactics, techniques, and procedures.
(CDRL A002)Create, document, and report metrics for analysis to improve weapon system processes and mission execution.
(CDRL A009).
Support operational leaderships tasking as it relates to Content Development functions and responsibilities Recommended Skills Assessments Automation Computer Networks Dashboard Metrics Open Source Technology Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.