It - cyber security architect / engineer cyber security architect / engineer Job at Artech LLC, California

WWlhWjhqQUhraWtVeFo3S0lOK3ZycVJiekE9PQ==
  • Artech LLC
  • California

Job Description

Hello,


I am Shweta, a recruiter at Artech, the #1 largest women-owned IT staffing firm in the US . We are constantly on the lookout for professionals to fulfil the staffing needs of our clients, and we currently have a few job openings that may interest you. Please find the below summary of one of our current opportunities.


Please let me know the best time to reach you, or you may call me directly at 973 933 4906  , However if you are not interested at this time, feel free to refer this position to someone you may know to be a fit.
Below are the position details for your reference: 
Job Title : Cybersecurity Wazuh SIEM/XDR Engineer
Location : Remote
Duration: 12 months + Possibility of Extension
Rate: $60 - $70 an hour on W2

Description:

Seeking a Cybersecurity SIEM Engineer to become part of its County of San Diego Cybersecurity Threat & Vulnerability team.

Location: Remote (Work schedule must align with client’s normal business hours (i.e., Pacific Time)

What you'll do:
• Provide Monitoring support in a 24x7x365 environment.
• Share in-depth knowledge and intelligence gained from cyber security events with stakeholders.
• Protect against and prevent potential cyber security threats and vulnerabilities.
• Monitor and analyze network traffic to identify potential security threats and vulnerabilities.
• Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.
• Provide response, technical assistance and expertise for significant cyber incidents, investigations, and related operational events.
• Contribute to security policies, procedures, and documentation.
• Conduct advanced analysis and recommend remediation steps.
• Analyze network events to determine impact.
• Develop and maintain analytical procedures to meet changing requirements.
• Coordinate during all cyber incidents.
• Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, effects on system and information.
• Determine tactics, techniques, and procedures for intrusion sets.
• Work with stakeholders to resolve computer security incidents and vulnerability compliance.
• Collaborate with cross-functional teams to ensure compliance with security standards and best practices.
• Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.
• Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.

Basic Qualifications:
• Demonstrated intermediate-to-advance subject matter expertise and operating experience with Wazuh SIEM and XDR
• Bachelor's degree and a minimum of 4 years' experience required. An additional 4 years of experience may be substituted in lieu of degree.
• Possess ONE of the following certifications: CND; CCNA-Security; CySA+; GICSP; GSEC; Security+ CE; SSCP
• Experience with Security Operations Center, network event analysis and/or threat analysis.
• Knowledge of cloud computing technologies to include Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS).
• Knowledge of traditional computing technologies architecture, design, and security.
• Expertise in usage of log aggregation and security analysis tools.
• Demonstrated knowledge of the Incident Response Lifecycle and how it applies to cloud, legacy, and hybrid environments.
• Ability to identify remediation steps for cybersecurity events.
• Demonstrated ability to utilize and leverage host-based tools to assist in determining scope and severity of a cybersecurity incident.
• Demonstrated strong organizational skills.
• Can analyze common encoding and obfuscation types (Base64, Caesar cipher, junk data, etc) and recognize advance types (XOR, AES, etc)
• Can examine and investigate common packet traffic and protocols.
• Can analyze common attack types (Cross-site scripting, directory traversal, denial of service, etc) and identify more advanced types (Ex. Client CVE related attacks)
• Proven ability to operate in a time sensitive environment.
• Proven ability to communicate orally and written.
• Proven ability to brief (technical/informational) senior leadership.
• Ability to scope and perform impact analysis on incidents.

Preferred Qualifications:
• Knowledge of network architecture, design, and security.
• Ability to analyze static and dynamic malware analysis reports.
• Ability to analyze and identify anomalous code as malicious or benign.
• Skill in detecting host and network-based intrusions via intrusion detection technologies.
• Knowledge of which system files (e.g., log files, registry files, configuration files) contain relevant information and where to find those system files.
• Skill in conducting trend analysis.
• Knowledge of adversarial tactics, techniques, and procedures.
• Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).
• Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored).
• Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).
• Knowledge of system administration, network, and operating system hardening techniques.
• Knowledge of packet-level analysis using appropriate tools.
• Knowledge of intersection of on-prem and cloud-based technologies.
• Knowledge of system design and process methodologies.
• Ability to coordinate with enterprise-wide cyber defense staff to validate network alerts.
• Assist in the construction of signatures which can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.


Regards,
Shweta Pandey
Technical Recruiter


Cell: 973 933 4906
Extension: 235
Email:

[email protected]

360 Mt. Kemble Avenue, Suite 2000 | Morristown, NJ 07960 
Website:


Job Tags

Similar Jobs

IKEA

In-store Warehouse Worker - Full Serve Job at IKEA

WHY WE WILL LOVE YOU You care about making a positive impact in the world. A warehouse job at IKEA is so much more than moving things from A to B. Its the stuff in between that makes being a member of our logistics team unique. Together, we work to make a better...

Mathnasium

Math InstructorTutor Job at Mathnasium

 ...Who We Are: Across North America and all over the world, Mathnasium Learning Centers are committed to teaching children math so that they understand it, master it, and love it. Our world-class curriculum is built upon the Mathnasium Method the result of decades of... 

Lovisa

Retail Sales Associate- Gateway Mall Job at Lovisa

Retail Sales Associate POSITION DESCRIPTION AND KEY MEASURES Department: Retail Operations Location: Store Location Report to: DM Number of direct reports: POSITION PURPOSE AND EXPECTATION: Position Summary: We're seeking an energetic and customer...

Lensa

Threat Assessment Analyst - Entry-Level Job at Lensa

 ...more about the history of GDBA ( . Learn more about our organization on our website ( or our LinkedIn page ( . This is an entry-level Analyst position in our Threat Assessment & Management Division. This position is based in San Antonio, TX and will be a mixture of... 

ECI -Engineers Construction, Inc.

Bridge Worker Job at ECI -Engineers Construction, Inc.

 ...Engineers Construction, Inc. in Williston has openings for experienced and aspiring Bridge Workers. Applicants should have at least 2 years of experience in a physical trade, such as construction, landscaping, agriculture, logging, sugaring, or automotive repair. Experience...