Midlevel Cybersecurity SIEM Monitoring Analyst

USA-VA-Herndon, USA-Remote Work

Apply now Apply later

General information

Requisition # R60648 Locations USA-VA-Herndon, USA-Remote Work Posting Date 05/22/2025 Security Clearance Required Secret Remote Type Hybrid Time Type Full time

Description & Requirements

Transform the future of federal services with ManTech! Join a vibrant, energetic team committed to enhancing national security and public services through innovative tech. Since 1968, we’ve partnered with Federal Civilian sectors to deliver impactful solutions. Engage in exciting projects in Digital Transformation, Cybersecurity, IT, Data Analytics and more. Ignite your career and drive change. Your journey starts now—innovate and excel with ManTech!

ManTech seeks a motivated, career and customer-oriented Midlevel Cybersecurity SIEM Monitoring Analyst to join our team in the DC, Maryland, and Virginia (DMV) area.

The ideal candidate will be an expert in Security Information and Event Management (SIEM) systems, responsible for designing, implementing, and maintaining SIEM solutions to protect DHS's networks and information systems from cyber threats and configures tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities. The specialist contributes to and executes the design, development, and implementation of the NOSC's enterprise attack sensing and warning (AS&W) security program, providing monitoring and analysis (M&A) capabilities for the enterprise security program. You will develop and implement the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, designing data flow diagrams and alert feed architectures to ensure seamless alert integration and monitors security queues and tool alerts to identify issues in advance. Additionally, you will participate in response activities to all major enterprise outages.

Responsibilities include, but are not limited to:

  • Develop and implement the enterprise Security Information and Event Monitoring (SIEM) strategy and tool implementation via Splunk, design data flow diagrams and alert feed architectures to ensure seamless alert integration
  • Develop and maintain SIEM architecture, including data sources, log management, and alerting mechanisms
  • Configure tools, settings, alerts, and notifications to improve the enterprise security and resilience capabilities, including implementation of Security Orchestration and Automation for Response (SOAR) capabilities; develops content for, e.g., rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.).
  • Develop content for rule implementation on network border devices (firewalls, routers, switches, IDS/IPS, Taclanes, etc.)
  • Monitor security events and alerts, conducting detailed analysis to identify potential security incidents; participates in response activities to all major enterprise outages
  • Collaborate with incident response teams to investigate and remediate security incidents.
  • Perform regular system health checks, maintenance, and upgrades to ensure SIEM performance and reliability

Minimum Qualifications:

  • Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field
  • 3+ years of experience in cybersecurity with a focus on SIEM engineering and operations
  • Proficiency with SIEM platforms (e.g., Splunk, Swimlane, ArcSight, QRadar, LogRhythm)
  • Strong understanding of network protocols, system logs, and security event correlation
  • Experience in developing and tuning SIEM use cases, correlation rules, and alerts
  • Relevant certifications such as CISSP, CISM, CEH, or SIEM-specific certifications (e.g., Splunk Certified Power User) are highly desirable

Preferred Qualifications:

  • Previous Network Operations Center (NOC) or IT Operations experience  
  • Familiarity with DHS policies and procedures.
  • Knowledge of broader cybersecurity frameworks (e.g., NIST, ISO 27001).
  • Understanding of ITIL4 principles 
  • Master’s Degree

Clearance Requirements: 

  • Must have a current/active Secret clearance with the ability to obtain and maintain a TS/SCI.
  • The ability to obtain and maintain a DHS EOD suitability is required prior to starting this position.

Physical Requirements: 

  • Must be able to remain in a stationary position 50% 
  • Constantly operates a computer and other office productivity machinery, such as a calculator, copy machine and computer printer 
  • The person in this position needs to occasionally move about inside the office to access file cabinets, office machinery, etc. 


ManTech International Corporation considers all qualified applicants for employment without regard to disability or veteran status or any other status protected under any federal, state, or local law or regulation.
If you need a reasonable accommodation to apply for a position with ManTech, please email us at careers@mantech.com and provide your name and contact information.
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  4  0  0
Category: Analyst Jobs

Tags: Analytics ArcSight Automation CEH CISM CISSP Clearance Clearance Required Computer Science Data Analytics Firewalls IDS Incident response IPS ISO 27001 LogRhythm Monitoring NetOps NIST QRadar Security Clearance SIEM SOAR Splunk Strategy Swimlane TS/SCI

Perks/benefits: Career development Team events

Regions: Remote/Anywhere North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.