Enable job alerts via email!

Splunk SOAR Engineer, TS/SCI CI Poly (Reston, VA)

Seibold GmbH

Reston (VA)

On-site

USD 80,000 - 120,000

Full time

30+ days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

Join a leading cybersecurity firm as a Splunk SOAR Engineer, where you'll play a pivotal role in automating incident response processes. This exciting position involves working closely with security analysts to streamline operations and enhance security posture through innovative automation solutions. You will be responsible for creating playbooks, managing incident response workflows, and leveraging your expertise in SOC operations to protect high-value assets. This role offers the chance to work in a dynamic environment, tackling complex security challenges while contributing to the safety of top organizations and government agencies. If you're passionate about cybersecurity and automation, this is the perfect opportunity for you.

Qualifications

  • 3+ years in SOC operations with a focus on incident response.
  • Experience in automating processes within a SOAR platform.
  • Strong analytical skills and attention to detail.

Responsibilities

  • Transform manual processes into automated playbooks in a SOAR platform.
  • Collaborate with analysts to enhance incident response with automation.
  • Manage incident response procedures and workflows.

Skills

SOC operations
incident response
SOAR platform automation
Python scripting
REST/SOAP APIs
Linux CLI
analytical expertise
network protocols

Tools

SIEM systems
cloud environments (AWS, Azure, GCP)

Job description

Splunk SOAR Engineer, TS/SCI CI Poly (Reston, VA)

Reston, VA

GuidePoint Security provides trusted cybersecurity expertise, solutions and services that help organizations make better decisions and minimize risk. By taking a three-tiered, holistic approach for evaluating security posture and ecosystems, GuidePoint enables some of the nation’s top organizations, such as Fortune 500 companies and U.S. government agencies, to identify threats, optimize resources and integrate best-fit solutions that mitigate risk.

An active Top Secret/SCI with CI Poly clearance is required prior to consideration for this role. Work is 100% onsite in Reston, VA.

What You'll Get To Do:

  • Help the SOC transform manual processes into automated playbooks inside a SOAR platform
  • Build and/or augment incident response processes with automation capabilities
  • Work with analysts to understand existing incident response processes and propose automation use cases to augment those processes
  • Use automation to streamline and standardize customer use cases
  • Work with management to understand incident response and automation reporting needs, then propose and build relevant reports and dashboards
  • Engage with other aspects of the Technical Operations including ticketing, monitoring, and detection tools
  • Work closely with the Security Analyst to automate the collection of supporting information for alert analysis and resulting defensive response
  • Respond to high-priority requests for information/custom detections from key partners
  • Manage and update incident response procedures and workflows/playbooks
  • Become a subject matter expert in the customers' high value assets and targets
  • Build novel monitoring and alerting playbooks to address potential targeted attacks
  • Perform other security operations necessary for continuous monitoring and triaging the platform

You'll Bring These Qualifications:

  • Minimum 3 years experience in SOC operations supporting incident response and/or detection engineering
  • Minimum 1 year experience in building automations in a SOAR platform
  • Experience working with structured data (JSON) and REST/SOAP APIs
  • 1+ years of scripting, Python strongly desired
  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly
  • Knowledge of how common protocols and applications work at the network level, including DNS & HTTPS
  • Experience using the Linux command line interface (CLI)

These Qualifications Would Be Nice To Have:

  • Experience managing or developing detection logic for enterprise SIEM systems
  • Experience with exploitation techniques and use case development
  • Experience with IOC datasets (e.g., YARA, OpenIOC, STIX)
  • Experience deploying to, and leveraging cloud environments (AWS, Azure, GCP) to extend operational capabilities
  • Strong knowledge of network monitoring and network exploitation techniques, including the MITRE ATT&CK technique framework and other common attack vectors
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.

Similar jobs

Splunk SOAR Engineer, TS/SCI CI Poly (Reston, VA)

GuidePoint Security

Reston

On-site

USD 70,000 - 110,000

30+ days ago

Splunk SOAR Engineer, TS/SCI CI Poly (Reston, VA)

GuidePoint Security, LLC

Great Falls Crossing

On-site

USD 80,000 - 120,000

30+ days ago