SIEM Engineer

Washington, DC

XOR Security is currently seeking a mid-level SIEM Engineer to support an Agency-level SOC. The SOC program provides comprehensive Computer Network Defense and Response support through continuous monitoring and analysis of potential threat activity targeting the enterprise.

In this role you will be working with the customer and in the SOC team to develop and integrate development use cases and data source ingestions for supporting the SOC analysis function, to include documentation of use cases/detection content, creation of automation routines and visualization. The use of SIEM-specific search languages and reporting of routine and specific SIEM activities for multi-level audience consumption. This role is integral in maintaining the customer’s detection coverage schema and advancing the SOC Operations and Engineering teams to pursue continuous improvement.

The successful candidate in this role will assist and mentor other cybersecurity team members. Research and keep up to date on threat actors and new TTPs. Deliver presentations to key business partners as well as help define roadmaps. Drive multiple simultaneous work streams; manage schedules, risks, and issues with effective communication to the team, to senior management and company executives.

REQUIRED

  • Bachelor’s Degree
  • 3+ years hands-on experience with Azure Sentinel preferred or the following SIEM tools: e.g., Splunk Enterprise, Elastic Security (ELK), ArcSight
  • Deep experience architecting, managing deployment, and operationalizing SIEM in client environments
  • Hands-on experience discovering solutions to ingest and onboard disparate types of log information.
  • Hands-on experience with APIs and integration of SaaS applications into the SIEM.
  • Hands-on experience with scripting languages; Python, PowerShell, Bash, Shell, others
  • Hands-on developing content and use-cases experience with SIEM query languages; Kusto Query Language (KQL) preferred or (Splunk Processing Language (SPL)
  • Understanding of the MITRE ATT&CK framework
  • Experience working with various technical departments to enhance threat detections of deployed SIEMs
  • Solid technical knowledge of Linux and Windows
  • Excellent root cause analysis skills
  • Demonstrated ability to create and present executive level briefings
  • Strong verbal & written communication skills
  • Strong critical thinking and group facilitation skills

NICE TO HAVES

  • Knowledge of information security standards (ISO, NIST, PCI, PIPEDA, GDPR etc.)
  • Experience with cloud environments with Azure preferred (e.g., Azure, AWS, GCP, etc.) and cloud security architecture
  • Proficiency in operating systems, database platforms, web technologies, firewalls and programming languages
  • Scripting experience with one or more of the following languages: PowerShell, Bash, Shell, Python

Closing Statement:

XOR Security offers a very competitive benefits package including health insurance coverage from the first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.

XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.

Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP REQUIRED.

 

Tags: APIs ArcSight Automation AWS Azure Bash Clearance Cloud ELK Firewalls GCP GDPR Linux MITRE ATT&CK Monitoring NIST PowerShell Python SaaS Scripting SIEM SOC Splunk TTPs Windows

Perks/benefits: 401(k) matching Health care

Region: North America
Country: United States
Job stats:  5  0  0

More jobs like this

Explore more InfoSec/Cybersecurity career opportunities

Find open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Analysis, Cryptography, Digital Forensics and Cyber Security in general, filtered by job title or popular skill, toolset and products used.