Home

Need-Cybersecurity CSOC Developer-Vienna VA hybrid at Vienna, Ohio, USA
Email: [email protected]
From:

Subham Mohanty,

VYZE INC

[email protected]

Reply to:   [email protected]

Hello,

Hope you are doing great.

Kindly go  through the below job description and share me your consultants updated profile:

Job Description

Title: Cybersecurity CSOC Developer

Location: Hybrid to Vienna VA

Visa: USC/GC/GCEAD

Cyber Security Content Development:

Create high-confidence security monitoring content consisting of dashboards and alerts within SIEM and other network security tools (Hybrid/Cloud) to detect threats, suspicious activities, potential incidents, and aid in analytical-investigations.

Continuously evaluate and optimize custom and OOTB (out of the box) detection content monitoring various on-prem and cloud servive provider environments in support to SOC operations.

Serve as lead cyber security content SME for collaboration with various teams for purposes including, but not limited to threat intelligence, hunt operations, red team engagements, identity management, security architecture review, security event logging issues, and detection content management for identifying gaps and enhancing NFCU cyber security monitoring posture. Log Analysis:

Troubleshoot issues in production and other test and development environments, applying debugging and problem-solving methodologies (e.g., log analysis, non-invasive tests).

Conduct independent critical thinking to diagnose and analyze threat intelligence data, latest threats and attack vectors, tactics, techniques, and procedures (TTPs) to make decisions on the most effective response and remediation strategies through content development.

Perform analysis of log files from a variety of sources (e.g., individual host logs, network traffic logs, firewall logs, and intrusion detection system [IDS] logs) to identify possible threats and vulnerabilities impacting the NFCU organization. Documentation and Process Improvement:

Develop technical documents including, but not limited to content creation, content/rule review process, language-specific querying for disparate log sources, network/security visibility issues, detection gaps, SOPs, and monitoring strategies.

Continuously executes timely and effective communication across team and management channels regarding tasks completed, roadblocks experienced, and process improvement opportunties identified.

7+ years of experience within cyber security operations and SIEM technologies serving in a senior analyst or supervisory role.

Advanced knowledge of content creation concepts, content development management, content testing, implementation, the revision cycle, and cybersecurity threat analysis of complex events.

Advanced skills in monitoring and analyzing logs and alerts from a variety of different technologies and sources, to include but not limited to IDS/IPS, firewall, proxies, network/host, antivirus, OS events, application/database, EDR, NDR, Cloud (IaaS, PaaS, SaaS).

Advanced skill in developing complex detection content using various data sources and query languages - e.g., custom SPL(macros, lookups, regex) SNORT, YARA, KQL

Experience in analyzing security systems, and how changes in conditions, operations, or the environment will affect deployed monitoring content.

Experience in applying cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Advanced knowledge of security architectures, devices, proxies, firewalls, and system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). Advanced understanding of blue team/red team processes and technologies and their applicability to custom content development

Advanced verbal and written skill presenting complex findings, conclusions, alternatives, and information clearly and concisely to all levels of management, supervisors, stakeholders and vendors through advanced research, analytical, and problem solving skills

Required: Experience with security tools related to IPS/IDS, Antivirus, Firewalls, Proxies, DLP, Forensic Analysis, Malware analysis, SIEM, Cloud, and the content development lifecycle

Required: Advanced skill in analyzing log events for on prem and cloud technologies to facilitate development of cyber defense detections

Desired: Splunk Power User, CySA+, CASP+, CISSP or other related Information Security certifications

Desired: Bachelor degree in cybersecurity or related discipline

Desired: Advanced knowledge of IT security standards and frameworks (e.g., MITRE ATT&CK )

Thanks and Regards.

Subham Mohanty

Technical Recruiter

Vyze INC(An E- VerifiedCompany)

Email:
[email protected]

25179 Methley Plum Place, Aldie, VA 20105

www.vyzeinc.com

Disclaimer:

This communication, along with any documents, files or attachments, is intended only for the use of the addressee and may contain confidential information. If you are not the intended recipient, you are hereby notified that any dissemination, distribution or copying of any information contained in or attached to this communication is strictly prohibited,

To remove your email address permanently from future mailings, please send REMOVE to

[email protected]

.

Keywords: information technology golang green card procedural language Virginia
[email protected]
View all
Fri Dec 22 01:09:00 UTC 2023

To remove this job post send "job_kill 960287" as subject from [email protected] to [email protected]. Do not write anything extra in the subject line as this is a automatic system which will not work otherwise.


Your reply to [email protected] -
To       

Subject   
Message -

Your email id:

Captcha Image:
Captcha Code:


Pages not loading, taking too much time to load, server timeout or unavailable, or any other issues please contact admin at [email protected]
Time Taken: 60

Location: , Virginia