Hi,

Hope you are doing well today!

*Please find below the detailed job description for your reference. If you
are interested please send me your updated resume along with your expected
hourly rate.*


*Client Job ID:* IDIQ-FQ15124-TOG8-RFQ12-PR40160

*Cyber Threat Engineer- Level3*

*Washington, DC (Jackson Graham Building)*

*1 year contract with possible extension*

*Client: WMATA*



*Deliverables*

3.8.6.2.1. Technical experience in cyber security, information assurance,
network security, computer information systems, computer science, or
management information systems

3.8.6.2.2. Knowledge and experience with Anti-Virus, Intrusion Detection
Systems, Firewalls, Active Directory, Vulnerability Assessment tools and
other security tools found in large network environments; along with
experience working with Security Information and Event Management (SEIM)
solutions

3.8.6.2.3. Understanding of common network services (DNS, web, mail, FTP,
etc.), network vulnerabilities, and network attack patterns

3.8.6.2.4. Understanding and familiarity with Security Information and
Event Management (SIEM) systems

3.8.6.2.5. Familiarity with intrusion detection / protection, firewalls,
and anti-virus systems

3.8.6.2.6. Knowledge and experience of managing network protocols

3.8.6.2.7. Microsoft and Linux hosting and systems Administration
experience

*Supplemental Duties*

3.8.6.1.1. Cyber Threat Engineer will work on all systems and/or projects
within the organization responsible for

providing Cyber Security Threat detection utilizing network and host based
Computer Security tools, appliances and end point products

3.8.6.1.2. Perform analysis of all security systems log files, review and
keep track of triggered events, research current and future cyber threats,
reconcile correlated cyber security events, develop and modify new and
current cyber security correlation rule sets, and operate security
equipment and technology

3.8.6.1.3. Document security incidents as identified in the incident
response rules and escalate to management as required

3.8.6.1.4. Monitor key security infrastructure elements, identify security
events, perform analysis, and initiate response activities

3.8.6.1.5. Perform packet analysis by identifying malformed packets and the
payload of the packet

3.8.6.1.6. Integrate security products, including designs for all
organizational networks as well as designing,

engineering, planning, integrating, configuring, testing and deploying

3.8.6.1.7. Maintain system baselines and configuration management items,
including security event monitoring "policies" in a manner determined by
the program management

3.8.6.1.8. Provide documentation and interaction with other analysts and
Operations and Maintenance (O&M) personnel to ensure a complete and
functioning system that meets requirements

3.8.6.1.9. Perform software testing (patches, other updates)

3.8.6.1.10. Troubleshoot OSI layer and TCP/IP related problems



*Looking forward to working with you!*

*Amanpreet Singh*

*Direct: 408 216 8035 Fax: 703-722-6628*

*Email: asi...@elegantsolutions.us <asi...@elegantsolutions.us>*




*Elegant Enterprise-Wide Solutions, Inc We Participate in E-Verify An SBA
8(a), ISO 9001:2008 Company Prime on GSA Schedule 70, 8(a) STARS II, eFAST,
Seaport-e & many State/Local Contractshttp://www.elegantsolutions.us
<http://www.elegantsolutions.us>*

-- 
You received this message because you are subscribed to the Google Groups 
"Vendors" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to vendors+unsubscr...@googlegroups.com.
To post to this group, send email to vendors@googlegroups.com.
Visit this group at https://groups.google.com/group/vendors.
For more options, visit https://groups.google.com/d/optout.

Reply via email to