Midlevel Cybersecurity SIEM Monitoring Analyst
USA-VA-Herndon, USA-Remote Work
Full Time Mid-level / Intermediate Clearance required USD 73K - 136K * est.
General information
Requisition # R60648 Locations USA-VA-Herndon, USA-Remote Work Posting Date 05/22/2025 Security Clearance Required Secret Remote Type Hybrid Time Type Full timeDescription & Requirements
Transform the future of federal services with ManTech! Join a vibrant, energetic team committed to enhancing national security and public services through innovative tech. Since 1968, we’ve partnered with Federal Civilian sectors to deliver impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite your career and drive change. Your journey starts now—innovate and excel with ManTech!ManTech seeks a motivated, career and customer-oriented Midlevel Cybersecurity SIEM Monitoring Analyst to join our team in the DC, Maryland, and Virginia (DMV) area.
The ideal candidate will be an expert in Security Information and Event Management (SIEM) systems, responsible for designing, implementing, and maintaining SIEM solutions to protect DHS's networks and information systems from cyber threats and configures tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities. The specialist contributes to and executes the design, development, and implementation of the NOSC's enterprise attack sensing and warning (AS&W) security program, providing monitoring and analysis (M&A) capabilities for the enterprise security program. You will develop and implement the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, designing data flow diagrams and alert feed architectures to ensure seamless alert integration and monitors security queues and tool alerts to identify issues in advance. Additionally, you will participate in response activities to all major enterprise outages.
Responsibilities include, but are not limited to:
- Develop and implement the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
- Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
- Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities; develops content for, e.g., rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.).
- Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
- Monitor security events and alerts, conducting detailed analysis to identify potential security incidents; participates in response activities to all major enterprise outages
- Collaborate with incident response teams to investigate and remediate security incidents.
- Perform regular system health checks, maintenance, and upgrades to ensure SIEM performance and reliability
Minimum Qualifications:
- Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field
- 3+ years of experience in cybersecurity with a focus on SIEM engineering and operations
- Proficiency with SIEM platforms (e.g., Splunk, Swimlane, ArcSight, QRadar, LogRhythm)
- Strong understanding of network protocols, system logs, and security event correlation
- Experience in developing and tuning SIEM use cases, correlation rules, and alerts
- Relevant certifications such as CISSP, CISM, CEH, or SIEM-specific certifications (e.g., Splunk Certified Power User) are highly desirable
Preferred Qualifications:
- Previous Network Operations Center (NOC) or IT Operations experience
- Familiarity with DHS policies and procedures.
- Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
- Understanding of ITIL4 principles
- Master’s Degree
Clearance Requirements:
- Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
- The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.
Physical Requirements:
- Must be able to remain in a stationary position 50%
- Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer
- The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc.
ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with ManTech, please email us at careers@mantech.com and provide your name and contact information.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics ArcSight Automation CEH CISM CISSP Clearance Clearance Required Computer Science Data Analytics Firewalls IDS Incident response IPS ISO 27001 LogRhythm Monitoring NetOps NIST QRadar Security Clearance SIEM SOAR Splunk Strategy Swimlane TS/SCI
Perks/benefits: Career development Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.