Development InfoStructure LLC., (DEVIS) provides exceptional DevSecOps integration in our agile software development and embedded software solutions, combined with comprehensive IT management and consulting services to our federal, state, and local governments. The outcomes of our research and development, products and universe of services will support the international development community, multiple civilian agencies and the nation’s defense and intelligence communities. Our focused research, services and products include complex DevSecOps solutions to support refugee processing across multiple federal agencies, research and development for Signal Intelligence (SIGINT), Command, Control, Communications, Computers and Intelligence (C4I), Data Analytics, and Intelligence, Surveillance and Reconnaissance (ISR) development and sensor capabilities supporting both the aerospace/defense and intelligence communities, as well as complex HHS comprehensive care coding requirements, and integrated management systems for our countries civilian agencies (FAA, FDIC, HOR, etc.).
Our primary mission is to best serve the needs of our clients by solutioning with our stakeholder teams to ensure that the goals and objectives of our customers are proactively solutioned, such that opportunities to invest our time in developing long-term solutions and assets are abundant and move our clients forward efficiently.
At DEVIS, we are enthusiastic about our research, our work and embracing an environment where all are supported in the mission, while maintaining a healthy work-life balance.
Overview
In this role you will focus on researching threats posed by cyber criminals to various systems, technologies, operations, and programs. You will analyze and conduct research to determine a cyber criminal’s capabilities, intentions, and attack approaches, including those with multiple phases. You will be responsible for proactively hunting and identifying malicious attacks against the organization's systems and infrastructure. In addition, you will be responsible for supporting remediation of any discovered threats, and providing incident response when necessary.
This role will also include developing and documenting new and innovative threat hunting processes to increase the security operation center team’s ability to find existing threats that are otherwise going unidentified or unnoticed.
Responsibilities
Create, manage, and support automation solutions for Splunk orchestration
Use the SIEM, EDR, IDS, and other tools to conduct cyber threat hunts
Rapidly respond to incidents to minimize risk exposure and ensure system availability; proactively monitor internal and external-facing environments
Identify attacker tools, tactics, and procedures to develop indicators of compromise. Form and articulate expert opinions based on findings and analysis
Seek opportunities to automate detection and remediation and reduce response times for incidents
Provide incident response support and coordination, including investigating security incidents and coordinating with other teams to contain and remediate the incident
Producing reports, metrics, and briefings that include perspectives on the behavior of adversaries
Collaborate and support inquiries from cross-functional internal and external stakeholders such as system administrators, compliance, and data engineering teams, to ensure documentation is complete and in compliance with information security policies
Manage and support development of security operations playbooks to ensure threat detection, monitoring, response, and forensics activities align with best practices, minimize gaps in detection and response, and provide comprehensive mitigation of threats
Evaluate third-party products and services to verify they meet security and compliance requirements
Drive improvements in technical architecture, standards, and processes to meet company objectives and best security practices
Develops technical solutions to autonomously verify compliance with required technical controls
Present findings/reports to stakeholders on a weekly basis
Required Skills and Qualifications
MA/MS (or equivalent experience), 5-7 years of experience OR Equivalent combination of education, technical training and certification (CISSP, C|EH, GIAC GREM, GCTI, GCFR, GCFA, Splunk Certified Cybersecurity Defense Analyst, Splunk Enterprise Security Certified Admin) and/or work experience.
3 years of experience in SPLUNK SIEM
Experience in building Splunk Technology Add-ons and configuring field extractions for various data sources.
Experience in designing, developing, testing, troubleshooting, deploying and maintaining Splunk solutions, reporting, alerting and dashboards.
Extensive knowledge of a tier Splunk installation; indexers, forwarders, search heads, clusters.
Experience analyzing system, network, and application logs for attack techniques at all stages of the cyber kill chain.
Experience in threat hunting and analysis.
Experience with more than one or more enterprise scale EDR and SIEM tool.
Experience consuming and analyzing Cyber Threat Intelligence for actionable takeaways.
Familiarity with ServiceNow Cloud offering
Clearance Requirements
Must be a U.S. Citizen with the ability to obtain and maintain a Secret clearance
Active Secret Clearance preferred
Additional Perks/Benefits
Competitive salary compensation
401k Retirement Contribution Savings Plan
Salary Range: $100,000 - $150,000
Devis is an AA/EOE/M/F/Disabled/VET Employer committed to providing equal employment opportunity without regard to an individual’s race, color, religion, age, gender, sexual orientation, veteran status, national origin or disability.
Powered by JazzHR