Cyber Security Engineer Sr SOC

arcsight, cyber, cyber engineer, cyber security engineer, linux, qradar, security, siem, SOC, splunk, unix, windows
Full Time, DirectHire/Fulltime
$115K-$120K
Telecommuting not available Travel not required

Job Description

Find me on LinkedIn, copy and paste: https://www.linkedin.com/in/jacquiwhite1

****** No Sponsorship Available * Corp to Corp NOT CONSIDERED********

 

Cyber Security Engineer – Sr SOC

Must Haves:    SOC Security, Unix Linux Windows, Splunk, ArcSight, QRadar, SIEM, IDSIPS

____________________________________________________________________________________      

 

Responsibilities include: 
Daily monitoring of event collection, security intelligence and emerging threat information sources including SIEM, vendors, researchers, websites, newsfeeds and other sources

·         Performs analysis of all threat/vulnerability sources assessing any impacts to infrastructure and systems and provides an assessment, recommendations and potential actions correlative to the security threat posture and matures the current vulnerability and scanning/assessment capabilities.

·         Coordinates response, triage and escalation activities for security events affecting the company’s information assets and activities with the incident response team as part of the security incident response lifecycle.

·         Identifies and creates use cases within the SIEM tool• Serves as one of the technical experts on the team• Develop communication channels with technology owners and the business to evangelize the evolving threat landscape.

·         Must be able to present to different audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc.

·         Must be able to establish and maintain business relationships with individual contributors as well as management.

·         Leads efforts in the improvement and development of process/procedure manuals and documentation for the escalation of threat intelligence, advanced persistent threat detection, vulnerability analysis and incident response handling.

·         Maintains a continuous process improvement work environment, for security monitoring, security configuration standards and threat analysis recommending and implementing new/improved process in accordance with existing policy, industry standards and best practices. 

 

 

 

Who you are…

 

You also meet most (if not all) of the following requirements:

Must Haves:    Cyber Security, SOC Security, Unix Linux Windows, Splunk, ArcSight, QRadar, SIEM, IDSIPS

3+ years of SOC security, intelligence threat event management, 10g analysis, ,network host, UNIX, Linux, Windows, Splunk, ArcSight, Q-Radar, SIEM, threat analysis, web malware, IDS, IPS, early morning 8:00am to 4:00pm.

Well known company in Carrollton, TX seeking a Cyber Security Engineer. If you like a culture where you will stretch your limits and give you exposure to cutting edge technologies, you’re in luck.

If nothing stands between you and your love Cyber Security, SOC, SIEM, Unix/Linux, Splunk or ArcSight don’t be coy and wait three days to call us. We want to hear from you now!

 

What our client wants you to do “aka” responsibilities…

Must Haves:    Cyber Security, SOC Security, Unix Linux Windows, Splunk, ArcSight, QRadar, SIEM, IDSIPS

____________________________________________________________________________________      

 

Responsibilities include: 
Daily monitoring of event collection, security intelligence and emerging threat information sources including SIEM, vendors, researchers, websites, newsfeeds and other sources

·         Performs analysis of all threat/vulnerability sources assessing any impacts to infrastructure and systems and provides an assessment, recommendations and potential actions correlative to the security threat posture and matures the current vulnerability and scanning/assessment capabilities.

·         Coordinates response, triage and escalation activities for security events affecting the company’s information assets and activities with the incident response team as part of the security incident response lifecycle.

·         Identifies and creates use cases within the SIEM tool• Serves as one of the technical experts on the team• Develop communication channels with technology owners and the business to evangelize the evolving threat landscape.

·         Must be able to present to different audiences and adjust accordingly (business, technical and management) either structured presentations or ad-hoc.

·         Must be able to establish and maintain business relationships with individual contributors as well as management.

·         Leads efforts in the improvement and development of process/procedure manuals and documentation for the escalation of threat intelligence, advanced persistent threat detection, vulnerability analysis and incident response handling.

·         Maintains a continuous process improvement work environment, for security monitoring, security configuration standards and threat analysis recommending and implementing new/improved process in accordance with existing policy, industry standards and best practices. 

 

 

 

Who you are…

 

You also meet most (if not all) of the following requirements:

3+ years of SOC security, intelligence threat event management, 10g analysis, ,network host, UNIX, Linux, Windows, Splunk, ArcSight, Q-Radar, SIEM, threat analysis, web malware, IDS, IPS, early morning 8:00am to 4:00pm.

____________________________________________________________________________________

5+ years of Information Security or related technology experience

·         At least 3+ years of Information Security Incident and Event Monitoring experience• 3+ years of experience with advanced knowledge of network protocols, routing and switching in complex environments

·         Experienced with using the command line interface (Unix, Linux, and Windows)

·         Advanced scripting experience (Python, Shell, Bash, Java, etc.)

·         Ability to communicate clearly, effectively, persuasively and credibly with internal and external customers and various levels of management both verbally and in written form• Self-starter with the ability to work independently or within a dynamic team environment

·         Attention to detail, logical and analytical thinking and systematic problem solving capability• Adept with researching and investigating anomalies

·         Experience working in a Security Operations Center (SOC) environment

·         Relevant security knowledge and experience in two or more of the following areas: security operations, security intelligence, threat analysis, security event management, log analysis, and network/host intrusion detection

·         Prior experience with system and security administration of multiple platforms and operating systems such as Unix/Solaris/AIX/Linux, Databases and Microsoft Windows

·         Demonstrated experience with using and/or implementing SIEM technology (Splunk, Arcsight, QRadar, etc) and use cases.

·         Demonstrated experience in handling SIEM events and response in critical environments (Email Threat Analysis, Web Threat Analysis, Malware Analysis, etc)

·         Strong knowledge of enterprise detection technologies and processes (Advanced Threat Detection Tools, IDS/IPS, Network Packet Analysis, Endpoint Protection) 

Who the Company is…

Our client is a large Financial Fortune 500 Company with a very talented group of people, where they maintain a friendly environment where people really want to work.

If this sounds great to you, come join us. Please email me your resume to: Jacqueline.white@requesttechnology.com : IND123

Tagged as: arcsight, cyber, cyber security engineer, linux, qradar, security, siem, SOC, splunk, unix, windows

 

If this sounds great to you, come join us. Please email me your resume to: Jacqueline.white@requesttechnology.com : IND123

Posted By

Jacqueline White

Dice Id : napil006
Position Id : JWFCyberSecEngi
Have a Job? Post it

Similar Positions

Senior Cyber Security Engineer - SOC
  • Request Technology, LLC
  • Herndon, VA
Cyber Threat Analyst
  • Dobra Resources, Inc
  • Herndon, VA
Arcsight Analyst
  • Experis
  • Arlington, VA
Incident Response Analyst
  • CSRA
  • Chantilly, VA
Lead Security Engineer
  • VariQ Corporation
  • Rockville, MD
Security Operations Analyst II
  • Research In Motion / Blackberry
  • Arlington, VA
SOC Analyst
  • Axxum Technologies LLC
  • Washington, DC
Cyber Security Consultant
  • NetSource, Inc.
  • Herndon, VA
SOC Tier II
  • Blue Canopy Group LLC
  • Arlington, VA
Sr. Threat Analyst
  • Smartlink, LLC (HQ)
  • Oakton, VA
Cyber Security Engineer
  • Metro Systems Inc
  • Arlington, VA
Cyber Security Analyst
  • Apidel Technologies
  • Washington, DC
Senior Engineer, Information Security
  • VeriSign
  • Washington, DC
Security Engineer (IT)
  • Metropolitan Washington Airports Authority
  • Arlington, VA