SC2023-002718 Sr Incident Detection Analyst - Cloud Security (NS) WED 27 SEP
Mons, Wallonia, Belgium
Full Time Contract Senior-level / Expert Clearance required USD 62K - 115K *
EMW, Inc.
NOTE: Subject RFQ was relaunched in its entirety as the previously submitted candidates were declared not compliant due to the following reasons: - Several candidates: no demonstrable cloud security experience - One candidate - non-compliant, no strong English written communication skills based on the CV. No dedicated cloud security experience. - One candidate - did not prepare for the interview and tried to wing it. Presentation below acceptable standard. To many errors on basic networking questions. No direct cloud knowledge, has just used Servers hosted in the cloud. CV not reflective of his real world experience based on the questions and answers in the interview - CV over exaggerated.
Deadline Date: Wednesday 27 September 2023
Requirement: Senior Incident Detection Analyst - Cloud Security
Location: Mons, BE
Full time on-site: Yes
Not to Exceed Rate: 106 EUR
Total Scope of the request (hours): 750
Required Start Date: 6 November 2023
End Contract Date: 31 December 2023
Required Security Clearance: NATO SECRET
Duties and Role:As a Senior Incident Detection Analyst (Cloud Security), the service provider will provide detailed analysis of logs and network traffic with a focus on cloud infrastructure. The successful candidate will be responsible for managing and maintaining the organisation's cloud security operations, including monitoring for and responding to security incidents.
Duties
- Provide subject matter expertise in the area of cyber security monitoring and detection within cloud infrastructure environments.
- Triage, analyse and respond to alerts originating from complex cloud infrastructure deployments and on-premise networks and security devices.
- Identify security gaps in NATO cloud security infrastructure, in addition to developing and maintaining new and existing use cases, using our on-premise SIEM solution (i.e., Splunk Enterprise Security).
- Develop processes for cloud security monitoring, including documentation of all use cases.
- Review current log collection state for NATO cloud environments, identify gaps and suggest improvements.
- Analyse threat intelligence pertinent to cloud environments to identify any new and developing security risks.
- Propose and work towards automating repetitive tasks related to cloud security monitoring and detection.
- Provide training and support to other members of the organisation on the subject of cloud security best practices and incident response procedures.
- Be flexible and support your colleagues in securing NATO networks through ad hoc tasks.
- Ensure that the organisation's cloud infrastructure and security practices comply with applicable laws, regulations, and industry standards.
Deliverables
- Provide an average of 139 hours/month working on-site, embedded in the NCSC Ops Branch located in SHAPE, Casteau, Belgium.
- Develop new alerts, searches, reports and dashboards for security monitoring and detection specific to cloud environments. Each use case must reference the MITRE attack framework.
- Triage, analyse and respond to alerts. All critical alerts will be responded to within three hours.
- The service provider is expected to take the initiative to identify detection gaps, monitor the latest threats and offer suggestions for new content to the management team. Where possible full coverage of the MITRE attack framework is required. In some cases, it may be necessary to leverage solutions provided within the cloud environment itself.
- Provide and maintain full documentation for all cloud use cases, detailing the purpose of the use cases, how the logic functions and the actions that should be taken during an investigation.
- Develop dashboards that can provide situational awareness related to the security of the organisation's cloud security infrastructure. Including service KPIs and incident response metrics.
- Respond to ad hoc tasks given by the service delivery manager and cell head.
- Propose at least five security content optimisations and enhancements per week within cloud environment.
- The service provider is expected to provide accurate and complete deliverables in accordance with internal processes.
- The service provider shall be responsible for complying will all applicable local employment laws, in addition to following all SHAPE & NCIA on-boarding procedures. Delivery of the service cannot begin until these requirements are fulfilled.
- Each provider of this service must pass an assessment to demonstrate proficiency before being approved to provide the service. The assessment will follow a brief familiarisation period.
- For each individual delivering the service, the provider shall allocate 10 working days to the initial NCSC Ops familiarization and assessment process. Delivery of the service cannot begin until this is complete.
Requirements
Skill, Knowledge & Experience:
- The candidate must have a currently active NATO SECRET security clearance
- At least two years of demonstrable experience in security monitoring and analysis of enterprise level cloud environments (AWS and/or Azure).
- Comprehensive knowledge of the principles of computer and communications security, networking, and the vulnerabilities of modern operating systems and applications.
- Expertise in at least three of the following areas and a high level of experience in several of the other areas:
- Security monitoring and analysis using a variety of Security Event generating sources (e.g. Firewalls, IDS, Routers, EDR and AV).
- Cloud architectures and technologies (AWS and/or Azure).
- Managing security operations in public cloud services (AWS and/or Azure).
- Microsoft Sentinel.
- AWS cloud security tools.
- Splunk ES suite and Splunk Search Processing Language (SPL).
- Phantom SOAR playbook development.
- Security use case development aligned to the MITRE ATT&CK Framework.
Desirable
- Industry leading certification in the area of Cybersecurity, such as GCIA, GPCS, GCLD, GNFA, GCIH, CCSP, GSFE, GCFA, GCED, OSCP.
- A solid understanding of Information Security Practices relating to the Confidentiality, Integrity and Availability of information (CIA triad).
- Experience working with Full Packet Capture Systems e.g. Niksun, RSA/NetWitness.
- Experience working with Host Based Intrusion Detection systems (HIDS).
- Experience with Network Based Intrusion Detection Systems (NIDS) – e.g. FirePower, Palo Alto Network Threat Prevention.
- Strong knowledge of malware families and network attack vectors.
- Knowledge and experience in analysis of various threat actor groups, attack patterns and tactics, techniques, and procedures (TTPs), in-depth analysis of threats across enterprise environments by combining security rules, content, policy and relevant datasets.
- Ability to analyse attack vectors against a particular system to determine attack surface.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: AWS Azure CCSP CIA Clearance Cloud EDR Firewalls GCED GCFA GCIA GCIH GNFA IDS Incident response Intrusion detection KPIs Malware MITRE ATT&CK Monitoring NATO OSCP RSA Security Clearance SIEM SOAR Splunk Threat intelligence TTPs Vulnerabilities
Perks/benefits: Flex hours Startup environment
More jobs like this
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Analyste CERT / Incident Responder junior (H/F) jobs
- Open SOC Analyst jobs
- Open Senior Cybersecurity Engineer jobs
- Open Analyste CERT / Incident Responder senior (H/F) jobs
- Open Electronic Warfare Advanced Tactical Trainer jobs
- Open IT Security Analyst jobs
- Open Information Security Officer jobs
- Open Senior Information Security Engineer jobs
- Open Consultant SOC / CERT H/F jobs
- Open Cyber Security Specialist jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Security Operations Engineer jobs
- Open Staff Product Security Engineer jobs
- Open Senior SOC Analyst jobs
- Open Product Security Engineer jobs
- Open Staff Security Engineer jobs
- Open Staff Information Security Engineer jobs
- Open o365 Security Architect jobs
- Open Infosec Risk Manager jobs
- Open Cybersecurity Consultant jobs
- Open Chief Information Security Officer jobs
- Open Fortinet Firewall Engineer jobs
- Open Cyber Security Architect jobs
- Open Ingénieur DevSecops H/F jobs
- Open Application security-related jobs
- Open Risk assessment-related jobs
- Open Network security-related jobs
- Open SaaS-related jobs
- Open Governance-related jobs
- Open Pentesting-related jobs
- Open Java-related jobs
- Open Analytics-related jobs
- Open ISO 27001-related jobs
- Open Clearance-related jobs
- Open Vulnerability management-related jobs
- Open CISM-related jobs
- Open Security assessment-related jobs
- Open DevOps-related jobs
- Open APIs-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open Malware-related jobs
- Open Splunk-related jobs
- Open Kubernetes-related jobs
- Open CISA-related jobs
- Open DevSecOps-related jobs
- Open Terraform-related jobs
- Open IDS-related jobs
- Open GDPR-related jobs