18 Jul 2024 1520689 Soc Analyst - Systems Intergrator $50 Washington Dc, Usa Contract, 50

Details of the offer

Are you a skilled Security Operations Center (SOC) Analyst with a passion for leveraging Splunk to enhance security monitoring and incident response? Join our client's team as a SOC Analyst focused on Splunk and play a crucial role in protecting the organization's digital assets. As a SOC Analyst, you'll be at the forefront of detecting, analyzing, and responding to security incidents using Splunk's advanced capabilities.
Responsibilities: Design, implement, and manage threat detection alerts and dashboards into Splunk.Develop and maintain signature-based, behavior-based, and anomaly-based detections.Develop threat detections based on research of open sources, NIST 800-53 controls, Department of State guidelines, and network and application architecture/design.Integrate threat intelligence feeds and correlate events from various log sources to identify potential security incidents.Create and maintain documentation, such as job aids and SOPs, on processes, detections, and incident response.Write advanced ad hoc SPL queries.Analyze log files from a variety of sources (for example, individual host logs, network traffic logs, firewall logs, and intrusion detection system logs) to identify possible threats to network security.Monitor and investigate alerts, threat hunting, and notify designated managers, cyber incident responders, and cybersecurity service provider team members of suspected cyber incidents and articulate the event's history, status, and potential impact in accordance with the organization's cyber incident response plan.Prepare reports on investigations, incidents, and other security-related matters.Recommend and implement system enhancements that improve the performance, security, and reliability of the system.Demonstrate flexibility and eagerness to take on challenges by performing tasks not listed above.Provide support and troubleshooting assistance to both the SIEM administrator and system owners in resolving issues related to log parsing and log ingestion.Communicate clearly and concisely with managers and colleagues.Skills/Must have: U.S. citizenship.5+ years of related systems security engineering experience, primarily in the federal government environment, dealing with business critical, high-availability systems.5+ years SOC or cybersecurity-related experience.3+ years of experience with a SIEM tool, preferably Splunk.Experience with Splunk dashboard and Microsoft Sentinel.4+ years querying and manipulating data experience, including 2+ years' experience with SPL (required) with knowledge of data types, conditions, and regular expressions.Expert in SPL or related querying language.Expert in data analytics and log analysis; adept at extracting insights from diverse datasets.Salary: $50 Per HourInterested? Apply now!

#J-18808-Ljbffr


Nominal Salary: To be agreed

Source: Jobleads

Requirements

Data Quality Specialist Lead

TAFE NSW Life-Changing Careers Data Quality Specialist Lead Location negotiable (subject to campus availability) 2x temporary full time until November 2025 B...


From Tafe Nsw - New South Wales

Published 13 days ago

Business Analyst - Non-Financial Risk

Business/Systems Analysts (Information & Communication Technology) Are you passionate about driving meaningful change and delivering impactful solutions? A l...


From Morgan Mckinley - New South Wales

Published 13 days ago

Applications Specialist

At Varian, a Siemens Healthineers Company, we bring together the world's best talent to realize our vision of a world without fear of cancer. Together, we wo...


From 0460 Vms Australasia Pty Ltd. - New South Wales

Published 13 days ago

Security Operations Engineer

Salary: $900 to $1000 per day including super Location: Sydney CBD office Work Arrangement: Hybrid WFH 2 days a week Contract Duration: 6 to 12 month cont...


From Https:/Www.Energyjobline.Com/Sitemap.Xml - New South Wales

Published 13 days ago

Built at: 2024-11-06T05:55:08.532Z