SOSi

Threat Intelligence Platform Administrator

Job Locations US-NC-Raleigh
Job Post Information* : Posted Date 4 months ago(6/1/2020 10:56 AM)
ID
2020-3757
Category
Information Technology
Location : Location
US-NC-Raleigh
Clearance Requirement
Public Trust
Job Requires Relocation
No

Overview

SOS International LLC (SOSi), is seeking a Threat Intelligence Platform Administrator in North Carolina.

Responsibilities

Resources with Threat Connect experience in implementations. Personnel with strong data integration experience between multiple intelligence source feeds and Splunk preferred. Personnel will need to provide data analysis skills to identify trends and patterns. Resources with programming skills for improved automation is preferred.

Qualifications

 

  • BA/BS in computer science, information security, or a related field or equivalent experience.
  • CERTIFICATIONS: CISSP, CISA, CISM, GIAC, RHCE, CPTE, or CEH
  • Must be highly motivated with the ability to self-start, prioritize assignments, and work in a collaborative Agile team environment
  • Possess analytical skills to make efficient and acceptable decisions
  • Effective oral and written communication skills to interact with constituents and other teams.
  • Experience evaluating systems and network devices and enterprise networks for IA vulnerabilities
  • 3+ years of experience working in the areas of (intelligence, information security, network forensics, insider threat).
  • Familiarity with common network vulnerability/penetration testing methodologies and tools

Preferred Qualifications

  • Experience analyzing commercial and open source intelligence feeds, adding context, and sharing key findings through executive briefings
  • Provide expertise for developing and implementing a company’s cyber threat intelligence capability, federated across multiple operational units.
  • Experience developing Splunk queries/dashboards
  • Comfortable writing API integrations and working with a variety of security related technologies in a dynamic customer environment
  • Create and support data processing pipelines and storage systems for threat intelligence data.
  • 2+ years of Linux/Unix software development proficiency in any of the following languages; Java, Python, C++
  • Excellent knowledge of a wide variety of security solutions and technologies, including: Linux, Network architecture/implementation/configuration experience, Firewall technologies, proxy technologies, anti-virus, spam and spyware solutions (Gateway and SaaS), Malware/security experience
  • Be able to demonstrate expert level knowledge on how to enable indicator detection at every point along the kill chain.
  • Experience with relational and NoSQL databases.

Options

Sorry the Share function is not working properly at this moment. Please refresh the page and try again later.
Share on your newsfeed