05 Aug
Fed: Sr Security Engineer (SIEM, Splunk, Burp or Metaspolit) - DoD Clearance (3days onsite)
Virginia, Sterling , 20163 Sterling USA

Vacancy expired!

Job: Sr Security & Test Engineer (SIEM, Splunk, Burp or Metaspolit)Please submit the updated word copy of your resume along with you w2 hourly or salary expectations.

Location: Sterling, VA (Hybrid Schedule, 3 days onsite and 2 days telework)

Duration: 3 +years plus

Clearance: Must have DoD interim / Active Secret or TS.

Requirements: Key skills set (

Splunk ES, SIEM, Burp or Metasploit,

Incident response, IPs / IDs)All of the duties listed support one or more of the following cybersecurity related functions; informationsecurity, incident response, cybersecurity, user activity monitoring, computer forensics, SA&A,vulnerability assessment and management, network data capture, intrusion detection, log management,auditing, security incident and event management (SIEM), and penetration testing.Personnel assigned to this role will serve primarily on the Security Engineering Team. This role isresponsible for coordinating with internally with the TCV and other sections or divisions within the DOJ.Other sections include, but are not limited to, IT Operations, Engineering & Integration, and SoftwareOperations. Other Divisions include, but are not limited to, the Office of Investigative Technology.

Duties:• Engineers, architects, implements, deploys, maintains, and administers security products and tools.• Conducts research, evaluates, and makes recommendations on emerging technology.• Conduct cyber assessment activities including threat modeling, analysis and analysis of mitigation solutions;• Coordinate and address supply chain management concerns;• Coordinate with system architects and developers to provide oversight in the development of solutions and integration of security tools;• Conduct security testing and evaluation during the development and release process for security tools and hardware (virtual or physical);• Reviews, and interprets Federal guidelines and policies, and industry standard best practices.Architecting, engineering, integrating, developing and/or deploying information technology products (hardware and software) in an enterprise environment. Experience with the software development lifecycle and integration of security tools.

Minimum Relevant Experience for Cybersecurity and Security Engineering:Six (6) years of experience in Information System Security, security engineering and integrationcomputer forensics, insider threat, or SA&A. Extensive work experience and knowledge in; networkmonitoring, intrusion detection using host-based and network-based intrusion detection systems (IDS)and log management applications; testing, installing, patching, and upgrading computer hardware andoperating systems (e.g., Windows, and UNIX) in an enterprise environment; identifying, collecting,processing, documenting, reporting, cyber security/ incident response events; architecting, engineering,developing and implementing cyber security/incident response policies and procedures; engineering,testing, installing, patching, and upgrading various information security hardware and softwareapplications. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software,Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus,and Foundstone. Experience with government IT security regulations, Federal Information SecurityManagement Act (FISMA), National Institute of Standards and Technology (NIST), and American Societyof Crime Laboratory Directors (ASCLD).

Minimum Relevant Experience for Cybersecurity and Security Engineering:Six (6+) years of experience in

Information System Security, security engineering and integration computer

forensics, insider threat, or SA&A. Extensive work experience and knowledge in; network monitoring, intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (e.g., Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/ incident response events; architecting, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. Examples of tools include SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus, and Foundstone. Experience with government IT security regulations,

Federal Information Security Management Act (

FISMA),

National Institute of Standards and Technology (NIST), and American Society of Crime Laboratory Directors (ASCLD).

Education Substitution Any combination of certificates such as Microsoft's MCSE, or Cisco's, CCNA, CCDA, or CCNP, may be considered equivalent to two (2) year of general experience. Certificates under the DoD lAM, IAT, IASAE, or CSSP Levels II or III may be considered equivalent to two (2) years of relevant experience.

Vacancy expired!


Report job