Vulnerability Assessment Jobs

1 were found based on your criteria {{ paging.total|number:0 }} were found based on your criteria

show all
  • Hourly ({{ jobTypeController.getFacetCount("0")|number:0}})
  • Fixed Price ({{ jobTypeController.getFacetCount("1")|number:0}})
Hourly - Expert ($$$) - Est. Time: More than 6 months, 30+ hrs/week - Posted
Job Title: Senior Security SIEM Architect Job Duration: 1 year Job Location: Lower Manhattan, NY Travel Required: No Bill Rate: $80-90 per hour Conversion Max Salary: 175K Availability: Immediately Relocation: No relo available Shift: First Senior Security SIEM Architect - Dell SecureWorks Dell SecureWorks is a market leader in information security services with more than 4,000 clients worldwide spanning North America, Latin America, Europe, the Middle East and the Pacific Rim. Organizations of all sizes, across all industries rely on Dell SecureWorks to protect their assets, improve compliance and reduce costs. The combination of strong client service, award-winning security technology and experienced security professionals makes Dell SecureWorks the premier provider of information security services for any organization. Positioned as a leader of the MSSP industry by several global industry analyst firms, Dell SecureWorks also has received SC Magazine’s “Best Managed Security Service” award and Frost and Sullivan’s North America Security Incident Mitigation and Response Client Value Leadership Award, among others. Role Overview The Sr. Security Architect person should have the ability to identify security gaps and determine requirements by analyzing security incident trends, researching threats, conducting network security and vulnerability analysis, and identifying integration issues. This candidate should have a deep technical understanding of network model and the risks present at each layer, the functions of network equipment, and to understand security architecture and a wide range of security products, tools, and industry trends. This role is also responsible for the migration of current SIEM rules into a newly deployed SIEM, recommending the creation of new SIEM use cases/rules, and escalating critical alerts identified in a development environment to an operational Tier 1-3 function for action. Role Responsibilities -Utilize detective controls to develop rules and alerts to drive security monitoring -Receive and analyze network alerts from various sources within the firm and determine possible causes of security alerts -Recommend, test, tune and implement SIEM and other tooling correlation rules -Identify false-positives from alerting, and perform incident response, triage, incident analysis and remediation tasks -Provide SIEM and other tool rule requirements to Fusion Center teams -Continually evaluate, monitor, and recommend improvements to security controls and process improvement -Provide technical hands on support for the migration of SIEM rules -Recommend and build consensus across multiple Fusion Center teams on the creation of new SIEM use cases/rules -Identify and escalate critical alerts to a Tier 1-3 function for action -Create, modify, and update rules for SIEM and other tools -Interact daily with client’s Fusion Center teams that leverage SIEM and other tools to drive security alerting and monitoring -Assist with daily incident response, triage, incident analysis, and remediation tasks as necessary As a managed security provider, Dell SecureWorks expects its employees to understand and apply commonly known security practices and possess a working knowledge of applicable industry controls such as NIST 800-53. Employees will be expected to acknowledge their security responsibilities in writing prior to gaining access to company systems. Employees will be required to maintain a working knowledge of local security policies and execute general controls as assigned. Requirements -5+ year’s technical Information Technology experience -5+ years of Information Security or network operations experience -Experience in network forensics tools and methodologies -Computer security incident investigation and response experience -Experience investigating common types of attacks and Log analysis and experience reviewing Security Events -Experience with network packet analysis -Deep technical understating of TCP/IP, SSL, Exploit kits, DNS, and overall network architecture -Working within a fusion center, security operations, incident management, or command center environment Preferences -Bachelor’s degree in computer science, management information systems, or related field preferred -Bachelor’s degree in Information Security, Cyber Intelligence, Computer Science, Management Information Systems, or related discipline desired -CISSP, CEH, SANS GIAC series and other certifications that demonstrate a commitment to continued professional information security advancement are expected, but not required -Knowledge of multiple operating systems (Windows, Linux) -Detailed knowledge of security monitoring technologies and products in this space. -Incident response experience
Skills: Vulnerability assessment Architecture Security Infrastructure