Hispanic Diversity
Search

Senior Detection Engineer - Remote

companyCIS Security
locationUnited States
PublishedPublished: 12/8/2023

Overview

The Senior Detection Engineer will be a senior technical individual contributor position within CIS’s Operations & Security Services (OSS) Department. The Senior Detection Engineer will play a pivotal role in implementing, maintaining, monitoring, and managing Security Information and Event Management (SIEM) solutions provided by the Multi-State Information Sharing & Analysis Center (MS-ISAC) and Elections Infrastructure Information Sharing & Analysis Center (EI-ISAC) to of State, Local, Tribal, and Territorial (SLTT) organizations.

The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovation. We are a community-driven nonprofit responsible for industry leading best practices for securing IT systems and data. We lead a global community of IT professionals to continuously evolve these standards and provide products and services to proactively safeguard against emerging threats.

Salary Range: $108,100 - $163,600 We offer a competitive total rewards package at the Center for Internet Security:
  • Base salary is determined on a number of factors including, but not limited to, education, experience and skills.
  • Health (PPO, EPO, HSA), Dental & Vision Insurance eligibility starting from the first day of hire
  • $500 wellness card for Health Coverage Participants
  • 401(k) with 4% Company Match, vested from the first day of hire
  • Flexible Spending Account (FSA) & Dependent Care Account (DCA)
  • Life Insurance
  • Bonding Leave
  • Paid Volunteering Program
  • Bonus eligibility
  • Paid Time Off (PTO) inclusive of vacation, personal and sick time
  • Paid Holidays
  • Wellness Program
  • Employee Engagement Activities
  • Professional Development Opportunities
  • Tuition Reimbursement
  • Student Loan PayDown Program
  • Employee Referral program
  • Employee Assistance Program

What You'll Do

  • Develop advanced SIEM correlation rules, content, data models, connectors, reports, and dashboards based upon internal and customer requirements to detect emerging threats
  • Monitor the health and performance of the SIEM and related infrastructure
  • Manage, develop, and tune alerts, inputs, scripts, and APIs that integrate with the SIEM including log sources and troubleshooting sources or systems
  • Create custom queries and alerts for emerging threats that can be rapidly deployed to all SIEM monitored data sources
  • Implement the change control process and quality assurance standards for SIEM/SOAR systems to ensure changes are tested, rollback plans created, and alerts/queries have a low chance of causing negative performance impacts on the SIEM or overwhelm SOC analysts with false positives
  • Assist internal support teams with troubleshooting highly technical issues that cannot be resolved by lower-level support
  • Provide briefings and training to SLTT members, MS-ISAC and EI-ISAC executive committees, and internal stakeholders on cyber defensive technologies. This position will closely align with the sales, marketing, and communications teams to assist with pre- and post-sales support and providing input to develop materials for members
  • Other tasks and responsibilities as assigned

What You'll Need

  • Bachelor’s degree in information technology, cybersecurity, or a related field*
  • 5+ years’ experience in deploying and managing security monitoring and logging solutions including SIEM, syslog, and other log correlation, aggregation, and analytic platforms and experience tuning SIEM platforms that operate on events-per-second (EPS) cost models
  • Expert level knowledge of integrating security tools such as firewall, intrusion detection and prevention systems, data loss prevention, endpoint security tools, host-based logs, network logs, syslog, and other data sources into an overall SIEM solution
  • Significant experience with development of custom rules, alerts, reports, and dashboards for SIEM platforms
  • Significant experience at log enrichment, both process and sources and in using and writing regular expressions (RegEx)
  • Experience using and managing the Securonix SaaS SIEM environment, including SIEM, User Entity Behavior Analytics (UEBA), and Cloud RINs
  • Experience with Snowflake, Kafka, Apache technologies, Hadoop, and other data and analytics platforms and connectors
  • Experience with network forensics and toolsets such as Wireshark, PCAP, and tcpdump and with the MITRE ATT&CK framework
  • Experience with cloud technologies and providers such as Amazon, Azure, and Google
  • Excellent client-facing and internal communication skills
  • Solid organizational skills including attention to detail and multi-tasking skills
  • Candidate must be eligible to obtain National Security Clearance
  • The position is open to U.S. citizens and requires a favorably adjudicated DHS Fitness Review for Public Trust Positions**
  • Must be authorized to work in the United States

It's a Plus if You Have:

  • Advanced degree in Computer Science, Business, or related field
  • Strong presentation capabilities
  • Specific experience with emerging technologies in the cybersecurity domain
  • Experience in incident response, digital forensics, and security operations

*Additional years of relevant experience or a combination of an Associate’s degree or equivalent and relevant experience may be substituted for the Bachelor’s degree.

**Factors that may cause a negative Fitness Review decision include:

  • Criminal Conduct
  • Dishonest Conduct
  • Employment Misconduct
  • Alcohol Abuse
  • Drug Use (illegal drug use or use of a legal drug in a manner that deviates from approved medical direction) Additionally, illegal drug use includes the use of drugs that are illegal for federal purposes despite being legal in select states and countries, such as marijuana.)
  • False Statements
  • Financial Issues
  • Have not resided in the US for three (3) of the past five (5) years

At CIS, we are committed to providing an inclusive environment in which the diverse backgrounds, experiences, and views of our employees, members, and customers are valued and respected. It is through this commitment that we are able to work together towards our common mission: to make the connected world a safer place.