Cybersecurity SIEM Engineer – Remote

3970 Sherman Street, San Diego, CA, USA

Fortuna

We offer a people-centric and customized approach to help you not just survive but thrive in today’s competitive landscape.

View all jobs at Fortuna

Apply now Apply later

We are currently seeking a Cybersecurity SIEM Engineer to become part of the County of San Diego Cybersecurity Threat & Vulnerability team. This role offers an exciting opportunity to work on the front lines of cybersecurity defense, protecting critical infrastructure and sensitive data from emerging threats. As a key member of the team, you will play an essential role in monitoring, analyzing, and responding to security events, helping to ensure the safety and resilience of the organization's digital environment. If you are passionate about cybersecurity, threat analysis, and working in a fast-paced environment, this position provides an excellent platform to grow your career and contribute to meaningful projects.

Required US Citizen or Green Card Required

WORKSITE: Remote (Work schedule must align with client's normal business hours (i.e., Pacific Time))

WORK SCHEDULE: Must work Pacific Time hours

COMPENSATION: $70.00 -$75.00 per hour

WHAT WE OFFER:

  • Paid sick leave based on state regulations after 90 days of employment
  • Medical, dental, and vision are offered after a waiting period (60% paid by Fortuna)
  • Free TeleMedicine and Mental Health for all employees and their families
  • Additional volunteer options such as Group Life Insurance, Accidental Insurance, Critical Care, Short Term Disability


WHAT YOU'LL DO:

  • Provide Monitoring support in a 24x7x365 environment.

  • Share in-depth knowledge and intelligence gained from cyber security events with stakeholders.

  • Protect against and prevent potential cyber security threats and vulnerabilities.

  • Monitor and analyze network traffic to identify potential security threats and vulnerabilities.

  • Monitor and analyze Security Information and Event Management (SIEM) alerts to identify security issues for remediation and investigate events and incidents.

  • Provide response, technical assistance, and expertise for significant cyber incidents, investigations, and related operational events.

  • Contribute to security policies, procedures, and documentation.

  • Conduct advanced analysis and recommend remediation steps.

  • Analyze network events to determine impact.

  • Develop and maintain analytical procedures to meet changing requirements.

  • Coordinate during all cyber incidents.

  • Analyze identified malicious activity to determine weaknesses exploited, exploitation methods, and effects on system and information.

  • Determine tactics, techniques, and procedures for intrusion sets.

  • Work with stakeholders to resolve computer security incidents and vulnerability compliance.

  • Collaborate with cross-functional teams to ensure compliance with security standards and best practices.

  • Collect and analyze intrusion artifacts (e.g., source code, malware, and system configuration) and use discovered data to enable mitigation of potential cyber defense incidents within the enterprise.

  • Perform real-time cyber defense incident handling (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) tasks to support incident response.

WHAT YOU'LL BRING:

  • Demonstrated intermediate-to-advance subject matter expertise and operating experience with Wazuh SIEM and XDR.

  • Bachelor's degree and a minimum of 4 years experience required. An additional 4 years of experience may be substituted instead of degree.

  • Possess ONE of the following certifications: CND; CCNA-Security; CySA+; GICSP; GSEC; Security+ CE; and SSCP.

  • Experience with Security Operations Center, network event analysis, and/or threat analysis.

  • Knowledge of cloud computing technologies, including Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS).

  • Knowledge of traditional computing technologies architecture, design, and security.

  • Expertise in the usage of log aggregation and security analysis tools.

  • Demonstrated knowledge of the Incident Response Lifecycle and how it applies to cloud, legacy, and hybrid environments.

  • Ability to identify remediation steps for cybersecurity events.

  • Demonstrated ability to utilize and leverage host-based tools to assist in determining the scope and severity of a cybersecurity incident.

  • Demonstrated strong organizational skills.

  • Ability to analyze common encoding and obfuscation types (Base64, Caesar cipher, junk data, etc.) and recognize advanced types (XOR, AES, etc.).

  • Ability to examine and investigate common packet traffic and protocols.

  • Ability to analyze common attack types (Cross-site scripting, directory traversal, denial of service, etc.) and identify more advanced types (e.g., novel CVE-related attacks).

  • Proven ability to operate in a time-sensitive environment.

  • Proven ability to communicate orally and in writing.

  • Proven ability to brief (technical/informational) senior leadership.

  • Ability to scope and perform impact analysis on incidents.

Preferred Qualifications:

  • Knowledge of network architecture, design, and security.

  • Ability to analyze static and dynamic malware analysis reports.

  • Ability to analyze and identify anomalous code as malicious or benign.

  • Skill in detecting host and network-based intrusions via intrusion detection technologies.

  • Knowledge of system files (e.g., log files, registry files, configuration files) and where to find relevant information.

  • Skill in conducting trend analysis.

  • Knowledge of adversarial tactics, techniques, and procedures.

  • Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks).

  • Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state-sponsored, and nation-sponsored).

  • Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks).

  • Knowledge of system administration, network, and operating system hardening techniques.

  • Knowledge of packet-level analysis using appropriate tools.

  • Knowledge of the intersection of on-prem and cloud-based technologies.

  • Knowledge of system design and process methodologies.

  • Ability to coordinate with enterprise-wide cyber defense staff to validate network alerts.

  • Assist in the construction of signatures that can be implemented on cyber defense network tools in response to new or observed threats within the network environment or enclave.

Fortuna operates as a staffing agency that sources, screens, and presents potential candidates for employment opportunities on behalf of our clients.

Fortuna was founded in 2012 by practicing professionals with more than 50 combined years of experience. Our headquarters is in McClellan, California with offices in Los Angeles and New York, and satellite offices in the Philippines and Israel. Fortuna is an active member of multiple California service agreements, including the CMAS, ITMSA (Tier 2), and CalPERS SpringFed Pool, as well as various municipalities and large corporation vendor pools

Career Site: www.gofortuna.com.


Apply now Apply later
Job stats:  0  0  0

Tags: AES Cloud CND Compliance Cyber defense GICSP GSEC IaaS Incident response Intrusion detection Log files Malware Monitoring PaaS SaaS Scripting Security analysis SIEM SOC SSCP Vulnerabilities XDR XSS

Perks/benefits: Equity / stock options Health care Insurance Medical leave Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.