Cybersecurity Specialist Senior

SAIC
Remote Work, AL, US
$80K-$120K a year
Remote
Full-time

Description

SAIC is seeking a Senior Cybersecurity Specialist to join our team providing Cybersecurity services for a major state & local government customer located in Texas.

This position reports to our Cybersecurity Operations Director and is a member of the 24x7x365 security operations (SecOps) team.

This analyst will have two primary categories of responsibilities : being a technical leader in the incident response and command function and assisting with SIEM administration and engineering.

During your tenure, you will learn the technical aspects of running and maintaining a SIEM, such as getting data in, authoring and tuning correlation rules, developing dashboards and reports, ensuring endpoints that are expected to send their logs are actually doing so, and other similar activities.

Your primary responsibility will be incident response including how to prepare, detect, respond / contain, mitigate / eradicate, report on, recover from, remediate, and learn from cybersecurity events and incidents in the enterprise.

This includes authoring, modifying, and maintaining our internal SOC playbook and associated procedures, as well as have rotating on-call responsibilities.

Primary job responsibilities include :

Driving progress on incident ticket resolution, including, but not limited to :

o Identifying root cause of issue

o Contain ongoing threats

o Directing partner technical service providers in tasks which restore affected systems to their secure baseline

o Coach, guide, and mentor more junior SOC analysts

Cyber Threat Intelligence (CTI) collection, analysis, production, and dissemination, including, but not limited to :

o High Profile Threats and Vulnerability reporting via email and via ticketing workflow

o Industry news relevant to cybersecurity and customer operating environments

o Enrichment of intelligence data with actions taken, recommendations, and other relevant information

Assist SIEM engineering with project-based and routine activities associated with :

o Getting data into the SIEM,

o Developing dashboards and reports

o Authoring new and / or tuning existing correlation rules

o Maintaining oversight of endpoint logging

  • Provide analysis and reporting of security events and investigations
  • Coordinate and collaborate with peer technical teams in a multi-vendor environment
  • Perform Advanced Threat Hunting using automated scanning tools and manually by performing Hypothesis Based Threat Hunting activities;

configure SIEM to automate threat hunting activities where possible

  • Perform Digital Forensic acquisition of data and associated investigation & analysis
  • Log security incidents and associated work notes in the ITSM ticketing system
  • Manage security incidents throughout their lifecycle to resolution
  • Provide support for routine and ad-hoc reporting
  • Support ad-hoc data call and investigation requests

Qualifications

Required :

  • Bachelor's degree in a relevant field of study (e.g. Cybersecurity, Information Systems, Computer Science, or other relevant business or IT field), plus relevant experience.
  • Excellent and demonstrated oral and written communication skills, including confident and concise oral communications used in leading Security Incident Response Team (SIRT) calls.
  • Familiarity with syslog-based logging server-side configurations.
  • Experience with Microsoft Office including Outlook, Word, and PowerPoint.
  • Obtain the Cybersecurity First Responder certification within 180 days of first day of employment.
  • Be a U.S. Citizen and able to pass an annual criminal justice background check.

Preferred :

  • Experience with ITIL, ITIL Foundation or higher certification.
  • Unix / Linux and / or Windows System Administration.
  • Familiarity with syslog-based logging client-side configurations.
  • Demonstrated experience with Microsoft Sentinel, Log Analytics, and other similar and supporting technologies; Current Microsoft Azure and / or security-related certification holders will be given strong preference.
  • Demonstrated experience with EnCase Digital Forensics / Investigator and Endpoint Security solutions; Current EnCE certification holders will be given strong preference.
  • ISC2, SANS / GIAC, and other industry-recognized cybersecurity certification(s) will be given preference.
  • Experience and familiarity with Cyber Threat Intelligence (CTI) programs, including indicators of attack, compromise, etc.

and associated actions taken to detect and block relevant indicators.

Experience with cloud security concepts within AWS, Azure, GCP, and / or OCI environments.

What we will provide :

  • On the job training of the customer operating environment and service provider tools.
  • A strong teamwork-based environment that enables close collaboration and support of each other.
  • A flexible approach to work schedule.

What we expect from you :

  • Passion, personality, and persistence you will provide the drive to learn and grow, while we provide the technical knowledge, and enable reimbursement of costs associated with passing exam fees, course study materials, and other costs based on leadership approval prior to the cost being incurred.
  • You must be able to provide on-call coverage on both a planned rotation and ad-hoc when issues arise, particularly after training is complete.
  • Continual learning you must be willing to continue to learn and grow through acquisition and application of additional coursework toward a new degree program and / or certifications.

SAIC will provide reimbursement for a portion of, or the entirety of the costs associated with these approved on a case-by-case basis, based on leadership approval prior to the cost being incurred.

Target salary range : $80,001 - $120,000. The estimate displayed represents the typical salary range for this position based on experience and other factors.

SAIC accepts applications on an ongoing basis and there is no deadline.

Covid Policy : SAIC does not require COVID-19 vaccinations or boosters. Customer site vaccination requirements must be followed when work is performed at a customer site.

2 days ago
Related jobs
SAIC
Remote Work, AL, US
Remote

SAIC is seeking a Senior Cybersecurity Specialist to join our team providing Cybersecurity services for a major state & local government customer located in Texas. This position reports to our Cybersecurity Operations Director and is a member of the 24x7x365 security operations (SecOps) team. Yo...

Promoted
Northrop Grumman
Huntsville, Alabama

Discover careers that change the world and further advancements in defense, technology, and engineering today at Northrop Grumman. Basic Qualifications:* · Bachelor's degree or higher in a STEM discipline (Science, Technology, Engineering, Math) with 2+ years of relevant experience, STEM Master's wi...

Promoted
KBR
Mooresville, Alabama

Modeling and Simulation (M&S) Verification, Validation, and Accreditation (VV&A) Analyst. Modeling and Simulation (M&S) Verification, Validation, and Accreditation (VV&A) Engineer/Analyst to support and standardize the V&V process for threat M&S across traditional, space, and AI-enabled systems. Col...

Promoted
SAIC
Work, Alabama

Engineering or Engineering Sciences Degree . The Systems Engineer responsibilities include, but are not limited to: . Performs functional analysis, timeline analysis, detail trade studies, requirements allocation and interface definition studies to translate customer requirements into hardware and s...

Promoted
All Points, LLC
Huntsville, Alabama

You will support IT networks, systems, and initiatives with activities that include information systems operations, information systems development and modernization, and IT security. ...

Promoted
MITRE
Huntsville, Alabama

Hands on technical expertise in any of the following additional areas: adversary emulation, defensive cyber operations, cyber analytics & malware analysis, cyber deception and adversary engagement, cyber effects and reverse engineering, and cyber forensic. MITRE’s Cyber Threat Intelligence and Adver...

Promoted
Lockheed Martin
Troy, Alabama

Bachelor’s degree in Electrical Engineering, Software Engineering or Computer Science- 5 years of professional experience or 3 years with a Master’s Degree. Lockheed Martin is a global security and aerospace company that employs approximately 114,000 people worldwide and is principally engaged in th...

Promoted
Booz Allen Hamilton
Huntsville, Alabama

Experience with cybersecurity policy to inform data strategy. Work as a member of a threat intelligence team responsible for understanding how emerging cyber threats impact the client organization while c. CEH and Security+ or CSA+ Certification. Applicants selected will be subject to a security inv...

Promoted
Vulcan Materials Company
Birmingham, Alabama

Master Data Governance Analyst. You will provide training, tools, and guidance to empower teams to identify and resolve data quality issues, while also supporting our master data governance program and contributing to our compliance efforts. Support compliance efforts by ensuring that master data go...

Promoted
Intuitive Research and Technology Corporation
Huntsville, Alabama

We are seeking an Entry Level Cyber Security Analyst who will support DoD based customers. BS or BA in cybersecurity or related field. In this highly motivated team-based environment, you will contribute throughout the Risk Management Framework (RMF) process including developing standard operating p...