Hi,
Hope you are doing well today! *Please find below the detailed job description for your reference. If you are interested please send me your updated resume along with your expected hourly rate.* *Client Job ID:* IDIQ-FQ15124-TOG8-RFQ12-PR40160 *Cyber Threat Engineer- Level3* *Washington, DC (Jackson Graham Building)* *1 year contract with possible extension* *Client: WMATA* *Deliverables* 3.8.6.2.1. Technical experience in cyber security, information assurance, network security, computer information systems, computer science, or management information systems 3.8.6.2.2. Knowledge and experience with Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in large network environments; along with experience working with Security Information and Event Management (SEIM) solutions 3.8.6.2.3. Understanding of common network services (DNS, web, mail, FTP, etc.), network vulnerabilities, and network attack patterns 3.8.6.2.4. Understanding and familiarity with Security Information and Event Management (SIEM) systems 3.8.6.2.5. Familiarity with intrusion detection / protection, firewalls, and anti-virus systems 3.8.6.2.6. Knowledge and experience of managing network protocols 3.8.6.2.7. Microsoft and Linux hosting and systems Administration experience *Supplemental Duties* 3.8.6.1.1. Cyber Threat Engineer will work on all systems and/or projects within the organization responsible for providing Cyber Security Threat detection utilizing network and host based Computer Security tools, appliances and end point products 3.8.6.1.2. Perform analysis of all security systems log files, review and keep track of triggered events, research current and future cyber threats, reconcile correlated cyber security events, develop and modify new and current cyber security correlation rule sets, and operate security equipment and technology 3.8.6.1.3. Document security incidents as identified in the incident response rules and escalate to management as required 3.8.6.1.4. Monitor key security infrastructure elements, identify security events, perform analysis, and initiate response activities 3.8.6.1.5. Perform packet analysis by identifying malformed packets and the payload of the packet 3.8.6.1.6. Integrate security products, including designs for all organizational networks as well as designing, engineering, planning, integrating, configuring, testing and deploying 3.8.6.1.7. Maintain system baselines and configuration management items, including security event monitoring "policies" in a manner determined by the program management 3.8.6.1.8. Provide documentation and interaction with other analysts and Operations and Maintenance (O&M) personnel to ensure a complete and functioning system that meets requirements 3.8.6.1.9. Perform software testing (patches, other updates) 3.8.6.1.10. Troubleshoot OSI layer and TCP/IP related problems *Looking forward to working with you!* *Amanpreet Singh* *Direct: 408 216 8035 Fax: 703-722-6628* *Email: asi...@elegantsolutions.us <asi...@elegantsolutions.us>* *Elegant Enterprise-Wide Solutions, Inc We Participate in E-Verify An SBA 8(a), ISO 9001:2008 Company Prime on GSA Schedule 70, 8(a) STARS II, eFAST, Seaport-e & many State/Local Contractshttp://www.elegantsolutions.us <http://www.elegantsolutions.us>* -- You received this message because you are subscribed to the Google Groups "Vendors" group. To unsubscribe from this group and stop receiving emails from it, send an email to vendors+unsubscr...@googlegroups.com. To post to this group, send email to vendors@googlegroups.com. Visit this group at https://groups.google.com/group/vendors. For more options, visit https://groups.google.com/d/optout.