Hi,
Hope you are doing well today!
Please find below the
detailed job description for your reference. If you are interested please send
me your updated resume along with your expected hourly rate.
Client Job ID: IDIQ-FQ15124-TOG8-RFQ12-PR40160
Cyber Threat Engineer- Level3
Washington, DC (Jackson Graham Building)
1 year contract with possible extension
Client: WMATA
Deliverables
3.8.6.2.1. Technical experience in cyber security, information assurance, network security, computer information systems, computer science, or management information systems
3.8.6.2.2. Knowledge and experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments; along with experience working with Security Information and Event Management (SEIM) solutions
3.8.6.2.3. Understanding of common network services (DNS, web, mail, FTP, etc.), network vulnerabilities, and network attack patterns
3.8.6.2.4. Understanding and familiarity with Security Information and Event Management (SIEM) systems
3.8.6.2.5. Familiarity with intrusion detection / protection, firewalls, and anti-virus systems
3.8.6.2.6. Knowledge and experience of managing network protocols
3.8.6.2.7. Microsoft and Linux hosting and systems Administration experience
Supplemental Duties
3.8.6.1.1. Cyber Threat Engineer will work on all systems and/or projects within the organization responsible for
providing Cyber Security Threat detection utilizing network and host based Computer Security tools, appliances and end point products
3.8.6.1.2. Perform analysis of all security systems log files, review and keep track of triggered events, research current and future cyber threats, reconcile correlated cyber security events, develop and modify new and current cyber security correlation rule sets, and operate security equipment and technology
3.8.6.1.3. Document security incidents as identified in the incident response rules and escalate to management as required
3.8.6.1.4. Monitor key security infrastructure elements, identify security events, perform analysis, and initiate response activities
3.8.6.1.5. Perform packet analysis by identifying malformed packets and the payload of the packet
3.8.6.1.6. Integrate security products, including designs for all organizational networks as well as designing,
engineering, planning, integrating, configuring, testing and deploying
3.8.6.1.7. Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined by the program management
3.8.6.1.8. Provide documentation and interaction with other analysts and Operations and Maintenance (O&M) personnel to ensure a complete and functioning system that meets requirements
3.8.6.1.9. Perform software testing (patches, other updates)
3.8.6.1.10. Troubleshoot OSI layer and TCP/IP related problems
Looking forward to
working with you!
Amanpreet Singh
Direct: 408 216 8035 Fax: 703-722-6628
Email: asi...@elegantsolutions.us
Elegant
Enterprise-Wide Solutions, Inc
We Participate in E-Verify
An SBA 8(a), ISO 9001:2008 Company
Prime on GSA Schedule 70, 8(a) STARS II, eFAST, Seaport-e & many
State/Local Contractshttp://www.elegantsolutions.us