Top Secret Clearance Jobs
Cybersecurity Threat Detection Developer
Top Secret Clearance Jobs, Pasco, Washington, us, 99302
About the job Cybersecurity Threat Detection DeveloperTop Secret Clearance Jobs
is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours.
Cybersecurity Threat Detection Developer
On site in Washington DC
Location: Washington DC (On site - no remote)
Clearance: Top Secret (able to obtain a SCI)
Seeking a highly motivated Cyber Security Content Developer/ Cyber Threat Detection Developer (Threat Detection Developer) for User Activity Monitoring (UAM) to join our team to support our government clients. This role requires a Content Developer to provide support for onsite Insider Threat support services providing immediate investigation and resolution. Any qualified Cyber Threat Detection Developer will need to have an active Top-Secret clearance with SCI eligibility.
This role is an opportunity to apply and grow your skillset in development work with a motivated and rapidly growing company and working with a wide range of technology-forward clients.
Job Responsibilities:
Self-directed team member who develops, implements, maintains, and supports SIEM dashboards, reports, alerts, and knowledge objectsCreate baselines, queries, dashboards, and visualization to support customer requirements shared with the SecOps and operational teams to identify trends, etc.Manages and administers the tuning of rules, triggers, policies, signatures, and custom content for specialized CND applications and systemsApply knowledge of regular expressions to create extractions and apply working knowledge of Power Shell or other scripting language(s)Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom correlation rules from all indexed sources to support continuous event monitoring and alertingParticipate in discussions to make recommendations on improving SOC cyber visibility, process improvements, and reducing the incident remediation periodReview all existing network event collections to determine if relevant data is present and make technical recommendations to develop or enhance alerting actionsEnhance customer's ability to accomplish mission initiatives by delivering forward-thinking solutions that are not defined by requirementsAuthor reports and/or interface with customers for ad-hoc requestsProvide expert guidance and mentorship to junior analystsRequired Qualifications:
US Citizen. Must have an active Top-Secret clearance (SCI eligible)Bachelor's degree in computer science, Information Technology, or a related field, or equivalent work experienceFive years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm)Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPLAdvanced knowledge of TCP/IP (Transport protocols geared to Network Engineering - Maybe change to encryption methods e.g. SSL/TLS and PKI) protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from security devicesMust have demonstrated the ability to tune the SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives, and/or known errorsExperience developing advanced correlation rules utilizing stats and data models for cyber threat detectionExperience with Network Monitoring Tools such as proxy, load balancing, IDS/IPS, and packet capturing toolsExperience in a scripting language (e.g. Bash, Powershell, etc) and automating SOC processes/workflowExperience implementing security methodologies and SOC processesAbility to effectively work independently and as a team memberWork experience with Security Operations Center (SOC) or Industry Red TeamFacilitate excellent problem-solving, critical thinking, and analytical skills with the ability to de-construct problemsWork experience with the Intelligence CommunityCritical thinking skillsMust possess strong written and verbal communication skills and must be capable of understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertisePreferred qualifications:
Highly Preferred to have an Active SCISplunk Enterprise Security Admin, Splunk Certified Developer certificationExtensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP toolsExpertise in developing Insider Threat trigger policiesInvestigate and analyze events of interest within the SIEM, document workflows, and identify process improvements in the handling and remediation of cybersecurity events8140.03 requirements?Identifies and remediates visibility gaps of cyber defense systemsExperience with Installing and administering COTS applications on RHEL Linux and/or WindowsHands-on experience with one of the enterprise cybersecurity toolsets: HBSS/ESS , Trellix and ePolicy OrchestratorHands-on experience running Tenable or vulnerability tracking/scanning systemsOther highly desired certifications: CEH , CYSA+ , GICSP, SSCP, CND
is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours.
Cybersecurity Threat Detection Developer
On site in Washington DC
Location: Washington DC (On site - no remote)
Clearance: Top Secret (able to obtain a SCI)
Seeking a highly motivated Cyber Security Content Developer/ Cyber Threat Detection Developer (Threat Detection Developer) for User Activity Monitoring (UAM) to join our team to support our government clients. This role requires a Content Developer to provide support for onsite Insider Threat support services providing immediate investigation and resolution. Any qualified Cyber Threat Detection Developer will need to have an active Top-Secret clearance with SCI eligibility.
This role is an opportunity to apply and grow your skillset in development work with a motivated and rapidly growing company and working with a wide range of technology-forward clients.
Job Responsibilities:
Self-directed team member who develops, implements, maintains, and supports SIEM dashboards, reports, alerts, and knowledge objectsCreate baselines, queries, dashboards, and visualization to support customer requirements shared with the SecOps and operational teams to identify trends, etc.Manages and administers the tuning of rules, triggers, policies, signatures, and custom content for specialized CND applications and systemsApply knowledge of regular expressions to create extractions and apply working knowledge of Power Shell or other scripting language(s)Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom correlation rules from all indexed sources to support continuous event monitoring and alertingParticipate in discussions to make recommendations on improving SOC cyber visibility, process improvements, and reducing the incident remediation periodReview all existing network event collections to determine if relevant data is present and make technical recommendations to develop or enhance alerting actionsEnhance customer's ability to accomplish mission initiatives by delivering forward-thinking solutions that are not defined by requirementsAuthor reports and/or interface with customers for ad-hoc requestsProvide expert guidance and mentorship to junior analystsRequired Qualifications:
US Citizen. Must have an active Top-Secret clearance (SCI eligible)Bachelor's degree in computer science, Information Technology, or a related field, or equivalent work experienceFive years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm)Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPLAdvanced knowledge of TCP/IP (Transport protocols geared to Network Engineering - Maybe change to encryption methods e.g. SSL/TLS and PKI) protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from security devicesMust have demonstrated the ability to tune the SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives, and/or known errorsExperience developing advanced correlation rules utilizing stats and data models for cyber threat detectionExperience with Network Monitoring Tools such as proxy, load balancing, IDS/IPS, and packet capturing toolsExperience in a scripting language (e.g. Bash, Powershell, etc) and automating SOC processes/workflowExperience implementing security methodologies and SOC processesAbility to effectively work independently and as a team memberWork experience with Security Operations Center (SOC) or Industry Red TeamFacilitate excellent problem-solving, critical thinking, and analytical skills with the ability to de-construct problemsWork experience with the Intelligence CommunityCritical thinking skillsMust possess strong written and verbal communication skills and must be capable of understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertisePreferred qualifications:
Highly Preferred to have an Active SCISplunk Enterprise Security Admin, Splunk Certified Developer certificationExtensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP toolsExpertise in developing Insider Threat trigger policiesInvestigate and analyze events of interest within the SIEM, document workflows, and identify process improvements in the handling and remediation of cybersecurity events8140.03 requirements?Identifies and remediates visibility gaps of cyber defense systemsExperience with Installing and administering COTS applications on RHEL Linux and/or WindowsHands-on experience with one of the enterprise cybersecurity toolsets: HBSS/ESS , Trellix and ePolicy OrchestratorHands-on experience running Tenable or vulnerability tracking/scanning systemsOther highly desired certifications: CEH , CYSA+ , GICSP, SSCP, CND