Easter Seals Jobs

Job Information

Supreme Court of the United States Senior IT Specialist (Security Information and Event Management Security Engineer) in Washington, District Of Columbia

Summary This is a full-time position with the Office of Information Technology at the Supreme Court of the United States in Washington, D.C. Closing Date: Friday, 09/20/2024, 11:59 PM EDT Please note that this vacancy has a limit of 200 applicants. The job opportunity announcement will automatically close if that limit is reached prior to the closing date. Responsibilities This position is a full-time position in the Office of Information Technology at the Supreme Court of the United States, in Washington, D.C. Under the guidance of the Court Information Security Officer, the incumbent will perform the full range of tasks and activities involved in developing, coordinating, implementing and maintaining standards, procedures and technical solutions to protect the confidentiality, integrity and availability of information systems and data. The Security Information and Event Management (SIEM) Security Engineer will have overall responsibility for the SIEM program at the Court. The role requires working with system administrators, engineers, developers, and incident responders to identify relevant system events, implementing the design, normalization, ingest, and alerting of relevant logs. The SIEM Engineer serves a critical role in support of investigations and escalations of SIEM alerts. The SIEM Engineer also administers the SIEM hardware, software, and endpoint agents across the enterprise. As a Security Engineer within the Court's Information Assurance Group, this role performs additional security engineering duties as assigned. The incumbent will be responsible for the following duties: - Manage and evolve the SIEM program over time according to Court priorities - Evaluate current and emerging SIEM technologies and risks - Install, configure, and maintain SIEM software and hardware - Architect, administer, configure, and optimize the SIEM platform to collect and correlate security event data - Implement the NIST 800-53 Audit and Accountability (AU) control family according to the Information Security Policy and the needs of Court offices - Define and update SIEM alerts, reports, and dashboards - Work with the Incident Response Team to develop playbooks for responding to SIEM alerts - Support the design and implementation of manual and automated response to security events (SOAR) - Train personnel in SIEM program operation - Coordinate and conduct SIEM training exercises with relevant stakeholders - Work with Incident Response Team to create detection rules for emerging threats - Participate in On-Call rotation (approximately one week every two months) - Incorporate threat intelligence feeds and indicators of compromise into SIEM alerting and dashboards - Coordinate with department stakeholders when new technologies are implemented to ensure appropriate data ingest Requirements Conditions of Employment Qualifications Candidate must possess the following knowledge, skills and abilities: - At least 2 years of experience managing enterprise SIEM tools - Enterprise level experience installing, configuring, and implementing RHEL, Ubuntu or similar Linux platforms - Experienced engineer with expertise in the design, implementation, configuration, and management of SIEM architectures - Experience with solutions such as SOAR, threat intelligence platforms, and/or User Behavior Analysis (UBA) - Knowledge of detection engineering and detection as code practices - Ability to optimize systems to meet enterprise performance requirements - Ability to work with engineers and vendors to improve capabilities, resolve issues, and increase performance of security operation devices and configurations - Knowledge of operating system (Windows, Linux/Unix) command-line tools - Knowledge of endpoint security events and how they relate to possible attacks/intrusions - Ability to balance business needs with security policies - Organizational skills with the ability to multitask, take direction, prioritize, and manage multiple activities/tasks to achieve objectives - Proficiency in tailoring and/or recommending detection rules based on newly discovered IOCs and threats against government networks - Expertise in data search, including indexing, querying, and visualization - Experience with API scripting and programming languages (e.g. Python) for automation and custom tool development - Excellent problem-solving skills and the ability to work under pressure in incident response scenarios - Strong communication skills, both written and verbal, to effectively convey complex security concepts - CISSP, GCIA, GCIH, CASP, and other security certifications desired, but not required Education Candidate must have: - Two years of demonstrated cyber security related experience and a college degree (computer related). or - Five years of demonstrated cyber security experience. Additional Information Working for the Supreme Court of the United States offers a comprehensive benefits package that includes, in part, paid vacation, sick leave, holidays, life insurance, health benefits, and participation in the Federal Employees Retirement System. Additional benefits include flexible spending accounts, long-term care insurance, and the SmartBenefits transit subsidy. The Court provides appropriate in-house and outside third-party technical training. Each staff member is provided with access to high levels of technical support; an in-house library of up-to-date commercially available technical books and software; a technology lab for development and testing of technology products; and a fully equipped computer training room. In addition, the Court provides all employees free access to an in-house exercise facility/weight training room. Recruitment incentives may be authorized. If authorized, certain incentives will require you to sign a service agreement to remain an employee of the Supreme Court of the United States for a period of up to 2 years. This statement does not guarantee that an incentive will be offered and paid. Incentives may include a recruitment incentive and/or creditable service for annual leave for prior non-federal related work experience or prior uniformed service, if the applicant possesses the skills and experience that are essential to the position, are necessary to achieve an important agency mission or performance goal and were acquired in a position with duties directly related to those of the position in which he or she is seeking appointment.

DirectEmployers