Job Title: Sr. Cyber Security Engineer (Palo Alto xSOAR automation engineer)
Job Location: Washington, DC (Remote – Need Once in a Quarter)
Job Type: Contract-To-Hire
Notes :-
- Only for H4-EAD/GC-EAD/GC
- Only for DC/MD/VA/WV/DE/PA/NC/NY/NJ
- Must have 7 years of Experience in USA Market
- Must have 5 yrs exp with Palo Alto – xSOAR (Palo Alto Cortex)
- Python strong Experience
Must Haves:
Palo Alto xSOAR automation engineer role
- 5 yrs exp with Palo Alto – xSOAR (Palo Alto Cortex) systems – automation tool (not firewall)
- Responsible for writing and building new automation, troubleshoot and tune them.
- 5 yrs strong Python experience.
- Networking experience.
Job Description:
- This position will support the SBP Security Engineering Support team to enhance our security tool integrations, automations, scripts, and playbook content for the SOAR platform. You'll be instrumental in maintaining and enhancing the security posture of vital systems.
- We are looking for a technical engineer to help maintain and support the xSOAR (Palo Alto Cortex) systems. Need someone with a demonstrated experience with SOAR tool suites that is resourceful in learning a very complex and dynamically changing network.
- Must be a self-starter, able to work independently, and able to manage time effectively.
This position a remote position but may require coming to office as needed.
Your Role Responsibilities:
- Manage the xSOAR platform to included troubleshooting, patching and upgrades.
- Lead security automation playbook development from requirements collection to implementation.
- Write, test, and maintain automation scripts/workflows within SOAR platform.
- Design, implement, standardize, and maintain efficient and reusable Python.
- Translate conceptual CSOC/IR requirements into technical data and integration requirements for the SOAR platform.
- Deliver API solutions that streamline, simplify, and improve efficiencies for the Cybersecurity teams as well as other enterprise Business Units.
Bonus:
- Experience with SPLUNK ES.
- RegEx experience.
- Experience administering Amazon Web Services (AWS)
- Experience deploying and correlating threat intelligence and vulnerability management solutions.
- Good understanding of Agile methodology
- Windows/Linux experience
Purpose:
- Develops and implements security solutions. Administers security technology systems by architecting and engineering/developing trusted systems into secure systems.
- Assists in the development of implementation and deployment plans that are aligned to the organizational strategic plan objectives and security requirements.
- Advises management in developing cybersecurity policies, processes, and procedures.
Essential Functions:
- 20% Assists with day-to-day support of security solutions.
- 20% Assists with engineering support and system administration of specialized cybersecurity solutions.
- 15% Solves complex problems and answers routine questions about the installation, operation, configuration, and customization of cybersecurity software.
- 15% Identifies potential conflicts with the implementation of any cybersecurity solutions.
- 10% Answers routine questions about the installation, operation, configuration, and customization of cybersecurity solutions.
- 10% Reviews and analyzes appropriate cybersecurity solution system logs for performance and functional anomalies.
- 10% Works with system design architects and project managers to provide security requirements.
Qualifications:
- To perform this job successfully, an individual must be able to perform each essential duty satisfactorily.
- The requirements listed below are representative of the knowledge, skill, and/or ability required.
- Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions.
Education Level: Bachelor's Degree
Education Details: Computer Science, Information Technology, or related field
Experience: 5 years relevant IT security experience
In Lieu of Education:
In lieu of a bachelor’s degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
Preferred Qualifications: Knowledge, Skills and Abilities (KSAs)
- Ability to perform risk assessments and investigate cyber security incidents. , Advanced
- Ability to understand vulnerabilities at a technical level., Advanced
- Knowledge of hardware and software, networks, data centers, systems, and cyber security related issues. , Advanced
- Proficient in ethical hacking techniques., Proficient
- Strong critical thinking ability and investigative/problem solving skills., Advanced
The incumbent is required to immediately disclose any debarment, exclusion, or other event that makes them ineligible to perform work directly or indirectly on Federal health care programs. Must be able to effectively work in a fast-paced environment with frequently changing priorities, deadlines, and workloads that can be variable for long periods of time. Must be able to meet established deadlines and handle multiple customer service demands from internal and external customers, within set expectations for service excellence. Must be able to effectively communicate and provide positive customer service to every internal and external customer, including customers who may be demanding or otherwise challenging.
Licenses/Certifications:
- CISSP Certified Information Systems Security Professional Upon Hire Req or
- CISM – Certified Information Security Manager Upon Hire Req or
- Certified Ethical Hacker (CEH) Upon Hire Req or
- Certified Information Systems Auditor (CISA) Upon Hire Req
Thanks & Regards
Yash Sharma | Technical Recruiter
LinkedIn: https://www.linkedin.com/in/yash-sharma-725538250/
An E-verify Employer
—
You received this message because you are subscribed to the Google Groups “Exclusive C2C Requirements” group.
To unsubscribe from this group and stop receiving emails from it, send an email to hot-requirements-2022+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/hot-requirements-2022/CAL0f-%3D7exjjTEu3TewGSOg6qkO_q9kV9gyL7zbwTTqgB-mUEAg%40mail.gmail.com.