Job Description:
XOR Security, An Agile Defense Company is currently seeking several Splunk Cyber Hunt and Detection Engineer to support an Agency-level SOC. The SOC program provides comprehensive Computer Network Defense and Response support through 24×7×365 monitoring and analysis of potential threat activity targeting the enterprise.
To ensure the integrity, security, and resiliency of critical operations, we are seeking candidates with diverse backgrounds in cyber security systems operations, analysis and incident response. Strong written and verbal communications skills are a must along with the ability to work shift.
***Regular days - Non shift work - Role will be 100% remote!
Basic Qualifications:
The Splunk Cyber Hunt and Detection Engineer shall have the following qualifications: • In-depth knowledge of Firewalls/Proxies/Intrusion Detection Systems/ Domain Name Servers/DHCP/VPN and other network technologies and tools • Experience updating, maintaining, and creating IDS variables within a complex enterprise network • Expert in creating, modifying, tuning IDS signatures/SIEM Correlation Searches/yara rules and/or other detection signatures • Familiarity with disk based forensic methodologies, Windows, and Linux forensic artifacts • Experience with Endpoint Detection and Response (EDR) tools such as Carbon Black, Tanium, Crowdstrike, etc • Able to create, modify, update, and maintain Python and Powershell scripts that enhance endpoint detection capabilities • In-depth knowledge of attacker tactics, techniques, and procedures • Author, test, and maintain automation scripts within SOAR platformPrimary Qualifications:
• Identify gaps in malicious activity detection capabilities • Create new signatures / rules to improve detection of malicious activity • Test and tune existing signatures / rules to ensure low rate of false positives • Assist in playbook development for alert triage and Incident Response • Define and implement alert and threat detection metrics, statistics, and analytics • Recommend new tools/technologies to improve network visibility • Support Incident Response and Forensic operations as required to include static/dynamic malware analysis and reverse engineering • Author and maintain scripts for threat detection and automation Must have one of the following certifications: GCIH – Incident HandlerGCFA – Forensic AnalystGCFE – Forensic ExaminerGREM – Reverse Engineering MalwareGISF – Security FundamentalsGXPN – Exploit Researcher and Advanced Penetration TesterOSCP (Certified Professional)OSCE (Certified Expert)OSWP (Wireless Professional)OSEE (Exploitation Expert)CCFP – Certified Cyber Forensics ProfessionalCISSP – Certified Information Systems SecurityCHFI – Computer Hacking Forensic InvestigatorLPT – Licensed Penetration TesterECSA – EC-Council Certified Security AnalystEnCEWindows Forensic Examinations – FTK WFE-FTKComputer Incident Responders Course - CIRCWindows Forensic Examination – EnCase – Counter Intelligence (CI) - WFE-E-CIForensics and Intrusions in a Windows Environment -FIWEXOR Security, An Agile Defense Company offers a very competitive benefits package including health insurance coverage from the first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.
XOR Security, An Agile Defense Company is an Equal Opportunity Employer (EOE). M/F/D/V.
Citizenship Clearance RequirementApplicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP