Epicareer Might not Working Properly
Learn More
N

Cybersecurity Detection Engineer

Salary undisclosed

Apply on


Original
Simplified

Cybersecurity Detection Engineer

The detection engineer blends technical skills, threat research experience, and knowledge of adversary techniques to work with new and existing data sources to create high fidelity, actionable alerts the ITSO SOC can use to quickly and effectively identify, analyze, and eradicate cybersecurity threats. This individual will be familiar with adversary Tactics, Techniques, and Procedures (TTPs), and will identify opportunities to improve the effectiveness of existing detection efforts. They will be responsible for developing methodologies to maintain and maximize the integrity and effectiveness of existing alerting through the creation, periodic review, testing, and validation of custom detection content. Additionally, they will leverage cybersecurity threat intelligence and collaborate with the SOC s incident response teams to meet operational needs and defend against real-world threats.

minimum qualifications:

  1. A minimum of three years of experience working in detection engineering, threat hunting, security operations, or incident response using Splunk Enterprise Security or Microsoft Sentinel.
  2. Experience with the processes to add/update/delete detection rules in Splunk Enterprise Security and Microsoft Sentinel.
  3. Proficient in detection engineering methodologies including SNORT and YARA rules.
  4. Proficient in Python programming, Bash, and PowerShell.
  5. Proficient in Splunk s Search Processing Language, React, Kusto Query Language, and the Common Information Model (CIM)
  6. Knowledgeable and experienced in leveraging cybersecurity threat intelligence, indicators of compromise, STIX/TAXII data feeds, MITRE ATT&CK, and SIEM integrations.
  7. Strong experience in networking principles, operating systems (Linux / Windows), and security tools such as IDS/IPS, firewalls, proxy servers and Endpoint Detection and Response (EDR).
  8. Knowledge of Windows Sysinternal Suite (including Sysmon) Unix auditd, and how to tune configuration files for identification of malicious activity.
  9. At least one of the following certifications: Splunk Enterprise Security Certified Admin credential or have passed the AZ-500 Microsoft Azure Security Technologies exam.

Duties:

Conduct functional and connectivity testing to ensure continuing operability. Develop and document systems administration standard operating procedures. Maintain baseline system security according to agencies policies. Manage accounts, network rights, and access to systems and equipment. Plan, execute, and verify data redundancy and system recovery procedures. Install, update, and troubleshoot systems/servers. Comply with agencies systems administration standard operating procedures. Implement and enforce local network usage policies and procedures. Manage system/server resources including performance, capacity, availability, serviceability, and recoverability. Monitor and maintain system/server configuration. Perform repairs on faulty system/server hardware. Troubleshoot hardware/software interface and interoperability problems. Supervises security system administrators.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.
Report this job