Halvik
Computer Security Systems Specialist
Halvik, Boulder, Colorado, United States, 80301
Halvik is a highly successful company that puts people first, and we are looking for someone just like you. We are committed to delivering smarter IT-driven solutions bolstered by quality and innovation to help our customers succeed. Come be a part of something truly special!
This position is part of the NCSC Security Operations Center (SOC) that executes 24x7 cybersecurity monitoring and incident response for NOAA networks. The Deputy SOC Manager will support the SOC Manager in overseeing day-to-day SOC operations, engage with Government leadership, create and deliver reports and briefings, and drive strategic SOC initiatives and improvements. Though a leadership role, the Deputy SOC Manager must also possess strong technical skills.
PRIMARY RESPONSIBILITIES:
- Guide and direct day-to-day SOC operations including event triage, analysis, quality assurance, and reporting.
- Conduct SOC administrative duties such as interviewing potential candidates, managing SOC staffing schedules, assessing adherence to processes and procedures, and responding to and reporting on compliance to tasks from Government and Program Leadership.
- Prepare and review various reports including, but not limited to, after action reports, SOC activity and productivity reports, case status reports, and ad hoc reports.
- Assist the SOC Manager with prompt onboarding of new personnel.
- Draft, review, update, and disseminate SOC process and procedure documentation.
- Collaborate with the SOC Leadership team to continuously identify opportunities for improving SOC operations and then leading initiatives to address them.
- Assist SOC Manager and SOC Incident Handling Lead during high-visibility and high-tempo incident response.
BASIC QUALIFICATIONS:
- Bachelor's degree and 8+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
- 4+ years of experience leading teams or projects
- 4+ years of prior incident handling/response experience
- 2+ years of prior SOC leadership experience
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports based on analytic findings.
- DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting.
- DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification is required.
- Hands-on experience with a variety of IDS, IPS, SIEM, and cybersecurity analytical tools.
- Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
- Strong analytical and troubleshooting skills.
- Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations.
- Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
- Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain and an ability to think and work independently
- Must be a US Citizen.
- Must have an active Interim Top Secret or adjudicated Secret to be considered for this role.
PREFERRED QUALIFICATIONS:
- Experience working in a DoD Cybersecurity Service Provider (CSSP) organization
- Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
- In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, ElasticSearch, QRadar, LogLogic).
- Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.
Halvik offers a competitive full benefits package including:
Company-supported medical, dental, vision, life, STD, and LTD insurance
Benefits include 11 federal holidays and PTO.
401(k) with company matching
Flexible Spending Accounts for commuter, medical, and dependent care expenses
Tuition Assistance
Charitable Contribution matching
Halvik Corp is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.
Halvik's pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.
This position is part of the NCSC Security Operations Center (SOC) that executes 24x7 cybersecurity monitoring and incident response for NOAA networks. The Deputy SOC Manager will support the SOC Manager in overseeing day-to-day SOC operations, engage with Government leadership, create and deliver reports and briefings, and drive strategic SOC initiatives and improvements. Though a leadership role, the Deputy SOC Manager must also possess strong technical skills.
PRIMARY RESPONSIBILITIES:
- Guide and direct day-to-day SOC operations including event triage, analysis, quality assurance, and reporting.
- Conduct SOC administrative duties such as interviewing potential candidates, managing SOC staffing schedules, assessing adherence to processes and procedures, and responding to and reporting on compliance to tasks from Government and Program Leadership.
- Prepare and review various reports including, but not limited to, after action reports, SOC activity and productivity reports, case status reports, and ad hoc reports.
- Assist the SOC Manager with prompt onboarding of new personnel.
- Draft, review, update, and disseminate SOC process and procedure documentation.
- Collaborate with the SOC Leadership team to continuously identify opportunities for improving SOC operations and then leading initiatives to address them.
- Assist SOC Manager and SOC Incident Handling Lead during high-visibility and high-tempo incident response.
BASIC QUALIFICATIONS:
- Bachelor's degree and 8+ years of prior relevant experience; additional work experience or Cyber courses/certifications may be substituted in lieu of degree.
- 4+ years of experience leading teams or projects
- 4+ years of prior incident handling/response experience
- 2+ years of prior SOC leadership experience
- Motivated self-starter with strong written and verbal communication skills, and the ability to create complex technical reports based on analytic findings.
- DoD 8570 IAT level II or higher certification such as CompTIA Security+ CE, ISC2 SSCP, SANS GSEC prior to starting.
- DoD 8570 CSSP-A level Certification such as CEH, CySA+, GCIA or other certification is required.
- Hands-on experience with a variety of IDS, IPS, SIEM, and cybersecurity analytical tools.
- Familiarity or experience in Intelligence Driven Defense, Cyber Kill Chain methodology, and/or MITRE ATT&CK framework.
- Strong analytical and troubleshooting skills.
- Demonstrated hands-on experience analyzing high volumes of logs, network data (e.g. Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations.
- Advanced understanding of TCP/IP, common networking ports and protocols, traffic flow, system administration, OSI model, defense-in-depth and common security elements.
- Demonstrated commitment to training, self-study and maintaining proficiency in the technical cybersecurity domain and an ability to think and work independently
- Must be a US Citizen.
- Must have an active Interim Top Secret or adjudicated Secret to be considered for this role.
PREFERRED QUALIFICATIONS:
- Experience working in a DoD Cybersecurity Service Provider (CSSP) organization
- Demonstrated understanding of the life cycle of network threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques and procedures (TTPs).
- In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g. ArcSight, Splunk, ElasticSearch, QRadar, LogLogic).
- Experience and proficiency with any of the following: Anti-Virus, HIPS/HBSS, IDS/IPS, Full Packet Capture, Network Forensics.
Halvik offers a competitive full benefits package including:
Company-supported medical, dental, vision, life, STD, and LTD insurance
Benefits include 11 federal holidays and PTO.
401(k) with company matching
Flexible Spending Accounts for commuter, medical, and dependent care expenses
Tuition Assistance
Charitable Contribution matching
Halvik Corp is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability or veteran status.
Halvik's pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities of the job, education, experience, knowledge, skills, and abilities, as well as internal equity, alignment with market data, applicable bargaining agreement (if any), or other law.