Logo
Top Secret Clearance Jobs

Top Secret Clearance Jobs is hiring: Cybersecurity Threat Detection Developer in

Top Secret Clearance Jobs, Pasco, WA, United States


About the job Cybersecurity Threat Detection Developer Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Cybersecurity Threat Detection Developer On site in Washington DC Location: Washington DC (On site - no remote) Clearance: Top Secret (able to obtain a SCI) Seeking a highly motivated Cyber Security Content Developer/ Cyber Threat Detection Developer (Threat Detection Developer) for User Activity Monitoring (UAM) to join our team to support our government clients. This role requires a Content Developer to provide support for onsite Insider Threat support services providing immediate investigation and resolution. Any qualified Cyber Threat Detection Developer will need to have an active Top-Secret clearance with SCI eligibility. This role is an opportunity to apply and grow your skillset in development work with a motivated and rapidly growing company and working with a wide range of technology-forward clients. Job Responsibilities: Self-directed team member who develops, implements, maintains, and supports SIEM dashboards, reports, alerts, and knowledge objects Create baselines, queries, dashboards, and visualization to support customer requirements shared with the SecOps and operational teams to identify trends, etc. Manages and administers the tuning of rules, triggers, policies, signatures, and custom content for specialized CND applications and systems Apply knowledge of regular expressions to create extractions and apply working knowledge of Power Shell or other scripting language(s) Utilize knowledge of latest cyber threats and attack vectors to develop and or maintain custom correlation rules from all indexed sources to support continuous event monitoring and alerting Participate in discussions to make recommendations on improving SOC cyber visibility, process improvements, and reducing the incident remediation period Review all existing network event collections to determine if relevant data is present and make technical recommendations to develop or enhance alerting actions Enhance customer's ability to accomplish mission initiatives by delivering forward-thinking solutions that are not defined by requirements Author reports and/or interface with customers for ad-hoc requests Provide expert guidance and mentorship to junior analysts Required Qualifications: US Citizen. Must have an active Top-Secret clearance (SCI eligible) Bachelor's degree in computer science, Information Technology, or a related field, or equivalent work experience Five years of experience in developing, implementing, and managing SIEM correlation rules and content (such as Splunk, ArcSight, Kibana, LogRhythm) Experience with writing audit log parsers for SIEM data structures such as ArcSight's CEF or Splunk's SPL Advanced knowledge of TCP/IP (Transport protocols geared to Network Engineering - Maybe change to encryption methods e.g. SSL/TLS and PKI) protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of security log data from security devices Must have demonstrated the ability to tune the SIEM event correlation rules and logic to filter out security events associated with known and well-established network behavior, known false positives, and/or known errors Experience developing advanced correlation rules utilizing stats and data models for cyber threat detection Experience with Network Monitoring Tools such as proxy, load balancing, IDS/IPS, and packet capturing tools Experience in a scripting language (e.g. Bash, Powershell, etc) and automating SOC processes/workflow Experience implementing security methodologies and SOC processes Ability to effectively work independently and as a team member Work experience with Security Operations Center (SOC) or Industry Red Team Facilitate excellent problem-solving, critical thinking, and analytical skills with the ability to de-construct problems Work experience with the Intelligence Community Critical thinking skills Must possess strong written and verbal communication skills and must be capable of understanding, documenting, communicating, and presenting technical issues in a non-technical manner to audiences with varying degrees of technical expertise Preferred qualifications: Highly Preferred to have an Active SCI Splunk Enterprise Security Admin, Splunk Certified Developer certification Extensive experience with User activity monitoring (UAM) ,User Entity Behavior Analytics (UEBA) and DLP tools Expertise in developing Insider Threat trigger policies Investigate and analyze events of interest within the SIEM, document workflows, and identify process improvements in the handling and remediation of cybersecurity events 8140.03 requirements? Identifies and remediates visibility gaps of cyber defense systems Experience with Installing and administering COTS applications on RHEL Linux and/or Windows Hands-on experience with one of the enterprise cybersecurity toolsets: HBSS/ESS , Trellix and ePolicy Orchestrator Hands-on experience running Tenable or vulnerability tracking/scanning systems Other highly desired certifications: CEH , CYSA+ , GICSP, SSCP, CND