Security Tools Engineer SIEM/LogA

SpektrumNorfolk, VA
6hOnsite

About The Position

Spektrum have a wide range of exciting opportunities in several global locations. We are always looking to add great new talent to our team and look forward to hearing from you. Spektrum supports apex purchasers (NATO, UN, EU, and National Government and Defence) and their Tier 1 supplier ecosystem with a wide range of specialist services. We provide our clients with professional services, specialised aerospace and defence sales, delivery, and operational subject matter expertise. We are looking for personnel to join our team and support key client projects. Who we are supporting The NATO Communication and Information Agency (NCIA) is responsible for providing secure and effective communications and information technology (IT) services to NATO's member countries and its partners. The agency was established in 2012 and is headquartered in Brussels, Belgium. The NCIA provides a wide range of services, including: Cyber Security: The NCIA provides advanced cybersecurity solutions to protect NATO's communication networks and information systems against cyber threats. Command and Control Systems: The NCIA develops and maintains the systems used by NATO's military commanders to plan and execute operations. Satellite Communications: The NCIA provides satellite communications services to enable secure and reliable communications between NATO forces. Electronic Warfare: The NCIA provides electronic warfare services to support NATO's mission to detect, deny, and defeat threats to its communication networks. Information Management: The NCIA manages NATO's information technology infrastructure, including its databases, applications, and servers. Overall, the NCIA plays a critical role in ensuring the security and effectiveness of NATO's communication and information technology capabilities. The program Assistance and Advisory Service (AAS) The NATO Communications and Information Agency (NCI Agency) is NATO’s principal C3 capability deliverer and CIS service provider. It provides, maintains and defends the NATO enterprise-wide information technology infrastructure to enable Allies to consult together under Article IV, and, when required, stand together in the face of attack under Article V. To provide these critical services, in the modern evolving dynamic environment the NCI Agency needs to build and maintain high performance-engaged workforce. The NCI Agency workforce strategically consists of three major categorise's: NATO International Civilians (NIC)'s, Military (Mil), and Interim Workforce Consultants (IWC)'s. The IWCs are a critical part of the overall NCI Agency workforce and make up approximately 15 percent of the total workforce.

Requirements

  • Extensive practical experience with Splunk (deployment, installation, configuration and maintenance)
  • Practical experience in designing Splunk based solutions
  • Knowledge of Splunk Enterprise security, Phantom and UBA
  • Expert level and previous experience related to SIEM/LogA management activities
  • Demonstrable experience of analysing and interpreting system, security and application logs in order to diagnose faults and spot abnormal behaviours.
  • Practical hands-on experience in systems and tools administration, especially Linux environment.
  • Comprehensive knowledge of the principles of computer and communication security, networking, and the vulnerabilities of modern operating systems and applications.
  • Practical skills in writing bash, python or ansible scripts to support repetitive tasks automation, Linux system and application administration and troubleshooting
  • Demonstrable ability to work autonomously and proactively, to understand the chain of command and to follow internal processes
  • Good communication abilities, both written and verbal, with the ability to clearly and successfully articulate complex issues to a variety of audiences and teams.
  • Solid understanding of regular expressions
  • Essential to have a Bachelor's Degree in Computer Science combined with a minimum of 2 years' experience as Cyber Tools Engineer or similar position involving technical ICT Engineering knowledge and management of cyber tools, or a Secondary education and completed advanced vocational education (loading to a professional qualification or professional accreditation) with a minimum of 4 years post related experience.
  • Valid National or NATO Secret personal security clearance

Nice To Haves

  • Extensive practical experience with Splunk Enterprise security, Phantom and UBA
  • Extensive practical experience with MicroFocus ArcSight
  • Experience of using and administering security tools such as Sourcefire, Symantec Endpoint Protection, or RSA Security Analytics
  • Experience in GIT
  • Hands-on experience with automation technologies, i.e. Ansible
  • Proficient with SIEM content creation – correlation rules, reports, dashboards
  • Experience in creation/modification of custom parsers or flex connectors
  • Understanding the Indicator of Compromise (IOC) concept andexperience in integration of Threat Intel feeds and IOCs with SIEM platform
  • Software engineering including programming and/or scripting knowledge (python, shell scripting, PowerShell).
  • Troubleshooting of Linux and/or Windows infrastructures.
  • Good knowledge of maintaining a secure enterprise network through configuring and managing typical Security Enforcing Devices, such as Firewalls, Proxies, IDS/IPS devices, HIDS/EPO.
  • Prior experience automating interactions between systems using APIs.
  • Industry leading certification in the area of Cybersecurity such as, but not limited to: CISSP, CISM, MCSE/S, CISA, SANS GNSA, SANS GIAC.
  • A solid understanding of Information Security Practices; relating to the Confidentiality, Integrity and Availability of information (CIA triad.)
  • Prior experience of working in an international environment comprising both military and civilian elements.
  • Prior experience as a user of SIEM and Log aggregation systems.

Responsibilities

  • Management, maintenance and configuration of SIEM/LogA tools: Security Incident Event Management (SIEM) – Splunk Enterprise Security, Microfocus ArcSight ESM;
  • Log Aggregation (LogA) - Splunk Forwarders, Microfocus Arcsight Loggers and Connectors
  • Setup a monitoring mechanism detecting potential issues in real time. The issues shall not be limited to the software configuration but to everything related to the proper delivery of the service (loss of log sources, performance issue, HW resources, data parsing, …)
  • Continuously monitor all system components (SIEM, LogA, log sources) and take appropriate actions for solving detected issues.
  • Support project activities related to SIEM/LogA capability; act as a subject matter expert (SME) and point of contact (POC) to facilitate further system development
  • Provide technical support in troubleshooting infrastructure and operational issues and collaborating with other teams for a successful resolution;
  • Provide required support and assistance for integration with external tools
  • Ensure that any SIEM/LogA specialised applications are installed, configured, and running properly and in line with dependencies with others systems or applications required
  • Identify upgrade requirements and areas of improvement to ensure an up-to-date and stable environment. Justify business needs, prepare documentation and propose implementation plan for the Change Management Board.
  • Implement the approved changes following co-ordination with other stakeholders
  • Proactively recommend optimizations to capabilities to provide effective and efficient service operations.
  • Review security documentation and provide technical advice, when requested.
  • Maintain awareness of new technologies and developments, industry standards and best practices; participate in knowledge sharing with SIEM/LogA community and develop solutions efficiently.
  • Create technical and/or executive level reports as required.
  • Provide subject matter expertise and input for any future projects and system expansion
  • Perform other essential duties as assigned.
  • Standard working hours, with the exception of working in non- standard working hours up to 360 hours annually.
  • In addition, it may exceptionally be required to work non-standard hours in support of a major Cyber Incident or on a shift system for a limited period due to urgent operational needs.
© 2024 Teal Labs, Inc
Privacy PolicyTerms of Service