Sorry, this listing is no longer accepting applications. Don’t worry, we have more awesome opportunities and internships for you.

Threat Detection Engineer/Content Developer

Gray Tier Technologies

Threat Detection Engineer/Content Developer

Arlington, VA
Full Time
Paid
  • Responsibilities

    Gray Tier Technologies is seeking an experienced threat detection engineer to join our team on a highly visible cyber security single award IDIQ vehicle. Duties include proactively searching for threats. Inspect traffic for anomalies and new malware patterns. Investigate and analyze logs. Develop custom content within the Splunk SIEM using advanced SPL language and data models) or other network security tools to detect threats and attacks against the department. SIEM Content Developers participate in briefings to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst may also be required to author reports and/or interface with customers for ad-hoc requests. In addition, the threat detection engineer may be asked to participate in discussions to make recommendations on improving SOC visibility or process.

    · Capture use cases from subscribers or other team members and develop correlation rules

    · Utilize knowledge of latest threats and attack vectors to develop Splunk correlation rules for continuous monitoring

    · Develop, manage, and maintain Splunk data models

    · Review logs to determine if relevant data is present to accelerate against data models to work with existing use cases

    · Develop custom regex to create custom knowledge objects

    · Developing custom SPL using macros, lookups, etc., and network security signatures such as SNORT and YARA

    · Develop custom dashboards and reports for customer stakeholders

    · Train and mentor junior staff

    BASIC QUALIFICATIONS:

    · Bachelor's Degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field PLUS at least eight (8) years of experience in incident detection and response, malware analysis, or cyber forensics

    · Extensive experience working with various security methodologies and processes

    · Advanced knowledge of TCP/IP protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from a large number of heterogeneous security devices

    · Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability Assessment, Intrusion Prevention and Detection, Access Control and Authorization, Policy Enforcement, Application Security, Protocol Analysis, Firewall Management, Incident Response, Web-filtering, Advanced Threat Protection

    · Experience developing advanced correlation rules utilizing tstats and data models for cyber threat detection

    · Experienced with creating and maintaining Splunk knowledge objects

    · Experienced managing and maintaining Splunk data models

    · Experience creating regex for pattern matching

    · Experience implementing security methodologies and SOC processes

    · Department of Homeland Security (DHS) Entry on Duty (EOD) is required to support this program

    PREFERRED QUALIFICATIONS:

    · Experience with cloud (e.g. o365, Azure, AWS, etc) security monitoring and familiar with cloud threat landscape

    · Completed Splunk Advance Searching and Reporting training

    · Experience developing custom scripts using python

    · Splunk certifications