Job Description:
XOR Security DC-based cyber team is tasked to support a federal customer located in Washington, DC. The team works 7am-7pm, 7 days per week, so shift (day) schedule may vary and can be discussed with management for optimal arrangement. Candidates must be proficient in Splunk queries and be an experienced analyst. They do not have to be a true subject matter expert, but that is the only labor category available to us corresponding to a specialty analyst role. As part of our high-performing team you will perform the following duties:
1The team will hunt for malicious activity using the following sources and tools :
Sources
IDS alerts
Network traffic and logs
Endpoint logs
Web server logs
Packet captures
Tools:
Splunk Enterprise
Splunk Enterprise Security
IDS systems
Packet Capture systems
Endpoint protection systems
All systems that contain security logs or security events that are not forwarded to the log repository
BASIC QUALIFICATIONS:
~4 years total relevant security, network, or IT experience
1+ years Splunk experience/exposure
SOC Analyst experience
1 or more relevant certifications, including Splunk Fundamentals 1 or 2, Cyber Security Analyst+ (CySA+), Incident Handling certification, CEH, etc.
Length of job: 12-15 months
Clearance Requirement: Interim Secret
XOR Security offers a very competitive benefits package including health insurance coverage from first day of employment, 401k with a vested company match, vacation and supplemental insurance benefits.
XOR Security is an Equal Opportunity Employer (EOE). M/F/D/V.
Citizenship Clearance Requirement
Applicants selected may be subject to a government security investigation and must meet eligibility requirements - US CITIZENSHIP.
Click the checkbox next to the jobs that you are interested in.
Forecasting Skill
Risk Assessment Skill
Dhara Consulting Group, Alexandria, VA
Leidos Inc, Alexandria, VA