Logo
Base One Technologies

Monitoring and Analysis Deputy Lead

Base One Technologies, Washington, District of Columbia, us, 20022

Save Job

Bachelor's degree in STEM, Cyber Security, or related field with 3 years of professional experience, or 5 years’ experience without a degree. Primary Responsibilities Lead efforts to reduce onboarding time through continuous observation and assessment of operations and administrative processes. Implement process improvements to enhance efficiency and reduce unnecessary efforts, leveraging process improvement methodologies, e.g. Lean Six Sigma. Continuously review and refine Standard Operating Procedures (SOPs) and workflows to ensure they are modern, efficient, and aligned with current needs. Collaborate with the SOAR team and other special teams to enhance automation and workflow capabilities. Provide superior customer service to the Department of Homeland Security (DHS) by accurately identifying and addressing ad hoc requests from federal leadership. Act as a point of contact for high-level leaders and leads on the federal side to ensure clear communication and understanding of requirements. Oversee and maintain compliance with required training programs, including on-the-job cybersecurity training and DHS-mandated e-learning courses. Manage and maintain access to cybersecurity tools, ensuring all team members have the necessary permissions to perform their roles effectively. Provide training on the use of various cybersecurity tools to team members, enhancing their capability to use the tools efficiently. Ensure that all shifts (Front Days, Back Days, Front Nights, Back Nights) do not miss important emails or tasks, maintaining consistency in task completion. Monitor and follow up on asks to ensure they are addressed and not overlooked, addressing gaps in previous processes. Perform quality assurance checks on Splunk comment closures, Splunk investigations, and cybersecurity investigations (ECMs). Conduct quality checks on EBMs or proxy and firewall blocks submitted within the network. Review trends and data to develop better content for Splunk alerting and monitoring. Continuously work to improve the accuracy and efficiency of monitoring content by analyzing investigation trends. Collaborate with the federal cybersecurity leads to reduce waste and improve meaningful cybersecurity processes. Engage with various teams to explore new methods to improve the work environment and cybersecurity services, including liaising with SOAR engineers and other special teams. Test and evaluate new tools and services requested by the customer in a testing or development environment, providing critical feedback and analysis before enterprise-wide acquisition. Basic Qualifications Bachelor’s degree in Computer Science, Engineering, Information Technology, Cybersecurity, or related field AND a minimum of four (4) years total professional experience in at least two of the areas listed below: Vulnerability Assessment Intrusion Prevention and Detection Access Control and Authorization Firewall Management Incident Response Advanced Threat Protection Military experience and training may be considered in lieu of degree. Active advanced cybersecurity certification(s). Experience conducting detailed technical analysis of Cybersecurity Events and Incidents. Must have current TS/SCI. In addition to specific security clearance requirements, all Department of Homeland Security SOC employees are required to obtain an Entry on Duty (EOD) clearance to support this program. Must have one of the following certifications: CCNA-Security, CYSA+, GICSP, GSEC, Security+ CE, CND, SSCP. Candidates should also demonstrate the following: Extensive knowledge of a SOC’s/NOSC’s purpose and role within an organization. Detailed understanding of common network ports and protocols (e.g. TCP/UDP, HTTP, ICMP, DNS, SMTP, etc). Expertise with network topologies and network security device functions (e.g. Firewall, IDS/IPS, Proxy, DNS, etc). Expertise with packet analysis tools such as Wireshark. Able to perform critical thinking and analysis to investigate cybersecurity alerts. Extensive knowledge of common malware and attack vectors. Extensive experience with Windows operating systems and standard OS logging. Extensive experience with Antivirus, DLP, and host-based firewalls. Requirement Certifications CCNA Security CCNP Security CCSP – Certified Cloud Security Professional CEH – Certified Ethical Hacker CISSP – Certified Information Systems Security CNDA – Certified Network Defense Architect ECSA – EC-Council Certified Security Analyst ECSP – EC-Council Certified Secure Programmer ECSS – EC-Council Certified Security Specialist ENSA – EC-Council Network Security Administrator GCIA – Intrusion Analyst GISF – Security Fundamentals GNFA – Network Forensic Analyst GXPN – Exploit Researcher and Advanced Penetration Tester LPT – Licensed Penetration Tester OSCE (Certified Expert) OSCP (Certified Professional) OSWP (Wireless Professional) SEI (Software Engineering Institute) CompTIA Cyber Security Analyst (CySA+) CompTIA Server+ Splunk Core Certified Advanced Power User Splunk Core Certified Consultant Splunk SOAR Certified Automation Developer CCNA Security CompTIA Cyber Security Analyst (CySA+) GICSP – Cyber Security Professional GSEC – Security Essentials CompTIA Security+ CE ISC2 Systems Security Certified Practitioner (SSCP) Preferred Qualifications Expertise in Lean Six Sigma, e.g. Black Belt or Green Belt. Familiarity with other continuous improvement methodologies, e.g. Theory of Constraints. Strong analytical skills with the ability to perform quality assurance and content improvement. Demonstrated ability to liaise between multiple teams and organizational levels. Excellent communication skills, both written and verbal, with the ability to interact effectively with federal leadership and team members across all shifts.

#J-18808-Ljbffr