Fed: Sr Security Engineer (SIEM, Splunk, Burp or Metaspolit) - DoD Clearance (3days onsite)

Fed: Sr Security Engineer (SIEM, Splunk, Burp or Metaspolit) - DoD Clearance (3days onsite)

09 Aug 2024
Virginia, Sterling, 20163 Sterling USA

Fed: Sr Security Engineer (SIEM, Splunk, Burp or Metaspolit) - DoD Clearance (3days onsite)

Vacancy expired!

Job: Sr Security & Test Engineer (SIEM, Splunk, Burp or Metaspolit)
Please submit the updated word copy of your resume along with you w2 hourly or salary expectations.

Location: Sterling, VA (Hybrid Schedule, 3 days onsite and 2 days telework)

Duration: 3 +years plus

Clearance: Must have DoD interim / Active Secret or TS.

Requirements: Key skills set (

Splunk ES, SIEM, Burp or Metasploit,

Incident response, IPs / IDs)All of the duties listed support one or more of the following cybersecurity related functions; information
security, incident response, cybersecurity, user activity monitoring, computer forensics, SA&A,
vulnerability assessment and management, network data capture, intrusion detection, log management,
auditing, security incident and event management (SIEM), and penetration testing.
Personnel assigned to this role will serve primarily on the Security Engineering Team. This role is
responsible for coordinating with internally with the TCV and other sections or divisions within the DOJ.
Other sections include, but are not limited to, IT Operations, Engineering & Integration, and Software
Operations. Other Divisions include, but are not limited to, the Office of Investigative Technology.

Duties:
• Engineers, architects, implements, deploys, maintains, and administers security products and tools.
• Conducts research, evaluates, and makes recommendations on emerging technology.
• Conduct cyber assessment activities including threat modeling, analysis and analysis of mitigation solutions;
• Coordinate and address supply chain management concerns;
• Coordinate with system architects and developers to provide oversight in the development of solutions and integration of security tools;
• Conduct security testing and evaluation during the development and release process for security tools and hardware (virtual or physical);
• Reviews, and interprets Federal guidelines and policies, and industry standard best practices.
Architecting, engineering, integrating, developing and/or deploying information technology products (hardware and software) in an enterprise environment. Experience with the software development lifecycle and integration of security tools.

Minimum Relevant Experience for Cybersecurity and Security Engineering:
Six (6) years of experience in Information System Security, security engineering and integration
computer forensics, insider threat, or SA&A. Extensive work experience and knowledge in; network
monitoring, intrusion detection using host-based and network-based intrusion detection systems (IDS)
and log management applications; testing, installing, patching, and upgrading computer hardware and
operating systems (e.g., Windows, and UNIX) in an enterprise environment; identifying, collecting,
processing, documenting, reporting, cyber security/ incident response events; architecting, engineering,
developing and implementing cyber security/incident response policies and procedures; engineering,
testing, installing, patching, and upgrading various information security hardware and software
applications. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software,
Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus,
and Foundstone. Experience with government IT security regulations, Federal Information Security
Management Act (FISMA), National Institute of Standards and Technology (NIST), and American Society
of Crime Laboratory Directors (ASCLD).

Minimum Relevant Experience for Cybersecurity and Security Engineering:
Six (6+) years of experience in

Information System Security, security engineering and integration computer

forensics, insider threat, or SA&A. Extensive work experience and knowledge in; network monitoring, intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (e.g., Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/ incident response events; architecting, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus, and Foundstone. Experience with government IT security regulations,

Federal Information Security Management Act (

FISMA),

National Institute of Standards and Technology (NIST), and American Society of Crime Laboratory Directors (ASCLD).

Education Substitution Any combination of certificates such as Microsoft's MCSE, or Cisco's, CCNA, CCDA, or CCNP, may be considered equivalent to two (2) year of general experience. Certificates under the DoD lAM, IAT, IASAE, or CSSP Levels II or III may be considered equivalent to two (2) years of relevant experience.

Job Details

  • ID
    JC44711686
  • State
  • City
  • Job type
    Permanent
  • Salary
    Depends on Experience
  • Hiring Company
    JPI Technology
  • Date
    2022-08-08
  • Deadline
    2022-10-07
  • Category

Jocancy Online Job Portal by jobSearchi.