Junior Cybersecurity SIEM Monitoring Analyst Job at hackajob in H...
hackajob - Herndon, VA, United States, 22070
Work at hackajob
Overview
- View job
Overview
Junior Cybersecurity SIEM Monitoring Analyst
Join to apply for the Junior Cybersecurity SIEM Monitoring Analyst role at hackajob
Junior Cybersecurity SIEM Monitoring Analyst
Join to apply for the Junior Cybersecurity SIEM Monitoring Analyst role at hackajob
hackajob is collaborating with ManTech to connect them with exceptional tech professionals for this role.
ManTech seeks a motivated, career and customer-oriented Junior Cybersecurity SIEM Monitoring Analyst to join our team in the DC, Maryland, and Virginia (DMV) area.
We are seeking a highly skilled SIEM Engineer/Specialist to join our Network Operations Security Center (NOSC). The ideal candidate will be an expert in Security Information and Event Management (SIEM) systems, responsible for designing, implementing, and maintaining SIEM solutions to protect DHS's networks and information systems from cyber threats and configures tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities. The specialist contributes to and executes the design, development, and implementation of the NOSC's enterprise attack sensing and warning (AS&W) security program, providing monitoring and analysis (M&A) capabilities for the enterprise security program. Develops and implements the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, designing data flow diagrams and alert feed architectures to ensure seamless alert integration and monitors security queues and tool alerts to identify issues in advance. Participates in response activities to all major enterprise outages.
Responsibilities Include, But Are Not Limited To
- Develop and implement the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
- Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
- Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities; develops content for, e.g., rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.).
- Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
- Monitor security events and alerts, conducting detailed analysis to identify potential security incidents; participates in response activities to all major enterprise outages
- Collaborate with incident response teams to investigate and remediate security incidents.
- Perform regular system health checks, maintenance, and upgrades to ensure SIEM performance and reliability
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field
- 1+ year of experience in cybersecurity with a focus on SIEM engineering and operations
- Proficiency with SIEM platforms (e.g., Splunk, Swimlane, ArcSight, QRadar, LogRhythm)
- Strong understanding of network protocols, system logs, and security event correlation
- Experience in developing and tuning SIEM use cases, correlation rules, and alerts
- Relevant certifications such as CISSP, CISM, CEH, or SIEM-specific certifications (e.g., Splunk Certified Power User) are highly desirable
- Previous Network Operations Center (NOC) or IT Operations experience
- Familiarity with DHS policies and procedures.
- Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
- Understanding of ITIL4 principles
- Master’s Degree
- Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
- The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
Seniority level
Seniority level
Not Applicable
Employment type
Employment type
Full-time
Job function
Job function
Information TechnologyIndustries
Software Development
Referrals increase your chances of interviewing at hackajob by 2x
Sign in to set job alerts for “Cyber Security Analyst” roles.
Washington, DC $80,000.00-$85,000.00 5 days ago
Information Security Analyst (SOC 2 Compliance)
Fairfax, VA $92,400.00-$115,000.00 1 month ago
Junior Cybersecurity Threat Intelligence Analyst
FBI Special Agent: Cybersecurity/IT Expertise
Arlington, VA $99,461.00-$128,329.00 1 week ago
Reston, VA $110,000.00-$130,000.00 4 months ago
Washington, DC $90,000.00-$110,000.00 5 days ago
2026674 Cyber Security Analyst $175,000.00
Washington, DC $85,000.00-$110,000.00 2 days ago
Washington, DC $55,000.00-$85,000.00 6 hours ago
Dulles, VA $90,000.00-$120,000.00 6 days ago
Washington, DC $90,000.00-$110,000.00 3 days ago
Chantilly, VA $120,000.00-$160,000.00 1 day ago
Rockville, MD $55,000.00-$125,000.00 2 days ago
2026675 Cyber Security Analyst $175,000.00
Security Operations Center Analyst (SOC)
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
#J-18808-Ljbffr