ZemiTek

Security Engineer

  • Job Type: Full Time
  • Industry Type: IT Sector
  • Industry Location: Washington D.c.
  • Experience: NA
  • No. of Positions: 1
  • Salary Range: 0-133 k
  • Primary Skills: Adobe AIR AppDetectivePRO Artificial intelligence Audit CAN CISA CISM CISSP COM Communication skills Compliance Configuration Cyber security Data collection Database IT Leadership OOP Nessus Networking
  • Secondary Skills: Operating systems Malware analysis Engineering support ICS Security engineering Security controls Threat analysis Vulnerability assessment System administration System requirements SAP BASIS SAFE Splunk QA Procurement Security operations Security clearance System on a chip Monitoring
  • Job Location: Washington D.c., DC
  • Posted Date: Posted today
Job Description

ZemiTek, LLC. is seeking a Splunk Security Engineer to provide IT professional and cybersecurity expertise in conducting security operations for the United States Marshals Service (USMS) P30 systems and integrated applications including (Splunk, Sentry, Tenable Security Center, and Appdetective).

Location: Washington, DC (Report to Office)

Clearance: Active Top-Secret Clearance Required

Salary Range: $90,000 - $133,000 (based on education and yrs of experience)

Responsibilities include, but are not limited to the duties listed below, as outlined in the contract statement of work:

  • Provide engineering support to aid in the security monitoring of USMS P30 enterprise systems and maintenance of enterprise security monitoring tools.
  • Support SOC activities by maintaining configuration of security monitoring tools to include:
    • Advises USMS senior leadership about monitoring and maintaining high security posture throughout the enterprise. Researches security products that align with mission objectives, and upgrade and update security applications in air-gapped/ closed networks.
    • Plans and implement/integrates new technology into existing infrastructure, provides analysis of hardware and software requirements used for product procurement, prepares technical and functional documentation for existing or proposed security infrastructure, and automates security functions and data collection using object-oriented programming.
    • Aggregates and correlates log data from operating systems, databases, and applications. Monitors for errors and set thresholds for expected activity in applications and databases and alert on specified deviation. Monitors implemented regulatory compliance on endpoints used to monitor for insider threat by alerting on unusual network activity and data movement.
    • Creates policies and rules for monitoring endpoints for malicious activity, ensuring only approved hardware is used at the endpoint. Detects, investigates, and mitigates suspicious activities and behavior. Provides visibility and auditing of potentially unsecured data, stop sensitive data from leaving the network, and stop data loss by securing endpoints.
    • Proactively works to identify advanced persistent threats and malware using artificial intelligence and machine learning before it can execute. Maintain and monitor endpoints for suspect and unsafe files on disk and in memory. Performs threat analysis to determine if suspect files are malicious. Performs analysis on hashes that are identified as suspect and determine if the files are benign or malicious.
    • Centrally manages enterprise-level database activity that includes vulnerability assessment functionality.
  • Utilizes the following cyber tools:
    • Splunk Enterprise Security,
    • Q-Audit ICS-500-27 Splunk application
    • Tenable Nessus Security Center
    • Cylance
    • Sentry (Insider Threat Tool)
    • AppDetective

Qualifications

Minimum Qualifications
• Bachelor's Degree;OR 4-5 years of relevant experience; OR Associate's degree and 2-3 years relevant experience.
• Eight (8) years of experience working with enterprise IT systems, of which a minimum of five (5) years includes support to classified system operations
• Must possess certification(s) in CISSP, CISA, CISM or vendor specific
• Must be able to function resourcefully and independently and work with a diverse team of IA/cybersecurity practitioners
• Strong written and verbal communication skills required.
• Experience working within DOJ Offices, Boards, and Divisions (OBDs), with an understanding of unique organizational security policies and security controls implementations within specific IT environments is desired.
• TS required

If you are hired for a ZemiTek corporate, project or consultant position, we will require proof that you have received the COVID-19 vaccine and are fully vaccinated, unless you qualify for a reasonable accommodation due to a valid religious or medical reason preventing you from being vaccinated.

ZemiTek is an equal opportunity employer where an applicant’s qualifications are considered for employment without regard to race, color, religion, sex, sexual orientation, age, gender identity or expression, national origin, genetic information, veteran status, disability, or any other basis prohibited by law.

ZemiTek embraces diversity, equity, and inclusion and strives to build and maintain a safe environment where we celebrate diverse backgrounds, treat everyone with respect, and value the unique lived experiences each person brings based on their race, ethnicity, sexual orientation, gender identity, religion, disability, military or veteran status, national origin, age, marital status or family status and related conditions.

ZemiTek is committed to the full inclusion of all qualified individuals. As part of this commitment, ZemiTek will ensure that persons with disabilities are provided reasonable accommodations. If you require reasonable accommodation in completing this application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please direct your inquiries to

 

Relevant Job Openings
System Analysts and System Administrators