Cyber Security Analytics SIEM Engineer job – Verizon – Ashburn, VA

Intelligence Analyst Jobs


Cyber Security Analytics SIEM Engineer


12,307 reviews

Ashburn, VA


Verizon’s Managed Security Services (MSS) business continues to grow very rapidly, our business is only growing stronger as the demand from customers to offload the very complex task of security management, continues to grow. Our MSS team provides: Access to security knowledge, expertise and best practices to design, implement and maintain a secure IT infrastructure. Monitoring and Management of security and related IT infrastructure. Prevention, detection and reporting of security threats in a constantly changing landscape. As part of the MSS organization and a member of the Threat Library team, the Threat Library Engineer will be an expert in the security analytics and security intelligence domain with a background in the enablement and in-life optimization of security monitoring technologies, services or products. The focus will be around creating/maintaining detection content on SIEM correlation engines on a global scale. Create & maintain global SIEM/Big Data detection content based on logs Perform quality assurance monitoring of the Verizon global and client specific security monitoring policies and operations. Identify opportunities to improve the service quality and operational scalability. Ensure the maintenance and optimization of the security monitoring libraries and policies. Assist in coaching and supporting MSS Operations Engineers, Client Services Managers and others by means of training and documentation. Research and certify security monitoring products for global supportability in MSS Operations. Develop a good working relationship with Product Management and Product Development working with both US and global clients and co-workers. Be motivated to grow into a global SME role specializing in technologies and products like SIEM, IDPS, Log Management & Big Data. Participate in regular Risk Intel briefings, provides input from the field and identifies trends, behaviors and threats for the security analytics service.


Must have: Bachelor’s degree in Information Security or equivalent work experience with security monitoring technologies and services. Four or more years of relevant experience Experience with intrusion detection and prevention and SIEM technologies Experience with security monitoring methodologies such as packet capture, patterns, watch lists, log parsing, correlation, classification, event generation, taxonomy, filtering, asset and vulnerability data. Knowledge and proven experience with incident handling, investigation and remediation best practices. Experience as a Security Analyst in a SOC is strong plus.

Ideally, you’ll also have:
Non-vendor specific certifications such as CISSP and preferably SANS/GIAC. Experience with at least 1 SIEM platform such as Splunk, ArcSight, Juniper STRM/IBM Qradar, RSA enVision or LogLogic. Experience with intrusion detection and prevention technologies: Cisco, Juniper, Tipping Point, McAfee, Sourcefire, Snort, Palo Alto, … Keen interest in the latest hacking techniques, vulnerability disclosures, data breach incidents and security analysis techniques. Good level of experience with Linux/Unix and is familiar with basic scripting Perl, bash and SQL. Acquainted with networking fundamentals. Relevant background in security enforcement products, such as firewalls, WAF, AV, content and URL filtering. Experience working in a global team and is willing to travel abroad occasionally. Strong ability to handle multiple tasks simultaneously. Necessary communications and interpersonal skills and be able to work effectively with peers, management, staff, and internal/external business partners/clients.

12,307 reviews

What makes a great career? If you ask us, we’ll tell you that it’s the experience, the people and the sense of pride that comes from…

= Intelligence Analyst Jobs