Today
Secret
Unspecified
Unspecified
Washington, DC (On-Site/Office)
Capgemini Government Solutions (CGS) LLC seeks a highly motivated SIEM engineer with experience handling both ArcSight and Splunk. The ArcSight/Splunk Engineer will be responsible for configuring the collection, parsing, correlation, and visualization of events for a critical operational system. Ability to demonstrate solid skills in system administration, log management, event correlation, and threat detection and will support building and maintaining a system that analyzes collected data and derives facts, inferences, and projections to resolve if the systems being supervised are operating normally. The individual will lead efforts to configure the systems which support analysts and end-users. The successful candidate will support the collection and extraction of data used to refine existing and new reports, analytics, and dashboards, and will be involved with the drafting and creation of reports and dashboards based on end-user requirements. They will also support the integration of resources across teams to better define the audit data being collected to eliminate false positives and false negatives from the data. The successful applicant will have the opportunity to apply and grow their skills, work with a motivated and entrepreneurial team, engage with a wide range of collaborators, and build CGS' capabilities to serve our clients. Job Responsibilities As a Principal SIEM Engineer (ArcSight & Splunk), you will be:
- Responsible for design, implementation and support ArcSight or Splunk core components, including ESM, Loggers, Smart Connectors, Indexers, Forwarders, Search Heads, and Cluster Managers
- Responsible for configuration and administration of ArcSight or Splunk ingestion and forwarding for new and existing applications and data
- Responsible for fix ArcSight or Splunk dataflow issues between the various event flow components
- Responsible for configuring and deploying data collection for a variety of operating systems and networking platforms
- Responsible for creating Dashboards and Analytics within SIEM tools
- Working with monitoring systems supporting auditing, incident response, and system health
- Responsible for understanding networking components and devices, ports, protocols, and basic networking fix steps
- US citizenship is required.
- Top Secret with SCI eligibility.
- Bachelor's degree in information technology, Computer Science, Information Systems, related field, or equivalent experience.
- A minimum of 8 years of related cybersecurity experience.
- A minimum of at least 4 years of proven ability with either ArcSight or Splunk
- Experience in design, implementation, and support of ArcSight or Splunk core components, including ESM, Loggers, Smart Connectors, Indexers, Forwarders, Search Heads, and Cluster Managers
- Experience with configuration and administration of ArcSight or Splunk ingestion and forwarding for new and existing applications and data
- Experience with fixing ArcSight or Splunk dataflow issues between the various event flow components
- Experience configuring and deploying data collection for a variety of operating systems and networking platforms
- Experience creating Dashboards and Analytics within SIEM tools
- Experience working with monitoring systems supporting auditing, incident response, and system health
- Understanding of networking components and devices, ports, protocols, and basic networking fix steps
- The ability to solve issues with log feeds, search time, and field extractions
- The ability to solve problems related to data solutions.
- Network Security Operations Center (SOC) experience
- Experience and talent in date correlation
- Experience creating workflows for Incident Response within a SIEM Tool
- GIAC Certified Incident Handler Certification
- GIAC Cyber Threat Intelligence Certification
- Cybersecurity certifications
- Formal SIEM training
group id: RTX1707fd