JPI Technology LLC
Fed: Security Operations (SOC) / IR (SOC, Splunk, SIEM) Clearance req
JPI Technology LLC, Fairfax, Virginia, United States, 22032
Overview
Fed: Security Operations (SOC) / IR (SOC, Splunk, SIEM) Clearance req Incident Response / Security Operations Specialist (II & III position) for a Federal client. Long engagement opportunity. Cleared US Citizens only due to government requirements. Location
Merrifield, VA Schedule
Onsite: 5 days a week onsite. Regular 8 hours shift (Mon to Fri shifts: 8am/9am or 10am). Clearance
Must have an active Interim, Secret or TS clearance. Requirements
Key skills: Incident Response, Splunk, SIEM, incident response and IPs/IDs. Experience
Seven (7) years of experience in IT and 5 to 7 years in Information Security Incident response/Operation/Cyber Security/Computer Forensics, or Insider Threat. Work experience and knowledge in network monitoring, intrusion detection using host-based and network-based IDS, and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting cyber security/incident response events; architecture, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. Experience with SIEM tools Information system security, cyber security, computer forensics, insider threat, information certification & accreditation regulations, Federal standards, industry best practices and guidelines. Experience using SIEM tools like SourceFire, Splunk, NetWitness, Guidance Software, Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus and Foundstone. Education
BS/BA in Computer Science, Information Systems Engineering, Business, Physical Science, or other technology-related disciplines. Certifications
Highly desired certificates (must be able to obtain within 3 months of joining): GCIA, GCIH, GSEC, GMON, Security+, Splunk Core Power User. Seniority
Mid-Senior level Employment type
Contract Job function
Information Technology, Other, and Management Industries
IT Services and IT Consulting Note: This posting contains no other changes to the core job information beyond formatting improvements and removal of boilerplate. #J-18808-Ljbffr
Fed: Security Operations (SOC) / IR (SOC, Splunk, SIEM) Clearance req Incident Response / Security Operations Specialist (II & III position) for a Federal client. Long engagement opportunity. Cleared US Citizens only due to government requirements. Location
Merrifield, VA Schedule
Onsite: 5 days a week onsite. Regular 8 hours shift (Mon to Fri shifts: 8am/9am or 10am). Clearance
Must have an active Interim, Secret or TS clearance. Requirements
Key skills: Incident Response, Splunk, SIEM, incident response and IPs/IDs. Experience
Seven (7) years of experience in IT and 5 to 7 years in Information Security Incident response/Operation/Cyber Security/Computer Forensics, or Insider Threat. Work experience and knowledge in network monitoring, intrusion detection using host-based and network-based IDS, and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting cyber security/incident response events; architecture, engineering, developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. Experience with SIEM tools Information system security, cyber security, computer forensics, insider threat, information certification & accreditation regulations, Federal standards, industry best practices and guidelines. Experience using SIEM tools like SourceFire, Splunk, NetWitness, Guidance Software, Digital Guardian, Raytheon (SureView), NMAP, Metasploit, Request Tracker, Nagios, Intelliview, Nessus and Foundstone. Education
BS/BA in Computer Science, Information Systems Engineering, Business, Physical Science, or other technology-related disciplines. Certifications
Highly desired certificates (must be able to obtain within 3 months of joining): GCIA, GCIH, GSEC, GMON, Security+, Splunk Core Power User. Seniority
Mid-Senior level Employment type
Contract Job function
Information Technology, Other, and Management Industries
IT Services and IT Consulting Note: This posting contains no other changes to the core job information beyond formatting improvements and removal of boilerplate. #J-18808-Ljbffr