Act as a point of escalation for other Engineers and provide guidance and mentoring.
Assist with client transition and onboarding serve as primary point of contact for Managed Security Service clients.
This will require documentation of Account Governance processes and responsibility for report generation and notification to senior leadership about potential client Service Level Agreement (SLA) issues.
Explain and demonstrate how to use observability products to both technical and relatively non-technical personnel.
Provide remote consulting services via interactive client sessions to assist with implementation of multiple product vendors and technologies.
Implement, configure, and maintain SIEM software and appliance-based products in large enterprise and Government environments.
Develop, deploy and tune SIEM content such as correlation rules, dashboards, reports, and models.
Provide escalation support to Tier 1 for Authorized Support Customers, following processes and interacting appropriately with both customers and partners when required.
2+ years of experience of Cribl Administration
2+ years professional experience managing and maintaining observability platforms.
Ability to deal confidently with complex technical problems.
Willingness to learn and support multiple observability vendor platforms.
You should have experience in designing, automating, maintaining, and optimizing observability platforms (metrics, logging, and tracing)
Knowledge of security logging for Linux, Windows, major EDRs, Firewalls, & Active Directory.
Expertise in delivering large-scale systems using big data technologies including but not limited to: Enterprise-scale Kafka, Splunk, TSDB, etc.
Previous experience working with Cloud (AWS, Azure, GCP)
You should be abreast of industry standards and trends related to telemetry and software pipelines.
The ability to aggregate and analyze logs from various deployed security devices.
Some experience with creating custom: content, dashboards, reports, and alerts.
Shift flexibility, including the ability to provide on call support (24/7) when needed.
Experience working with Internal and client Ticketing and Knowledge Base Systems for Incident and Problem tracking as well as procedures. (i.e., Jira, Confluence, ServiceNow etc.).
General security knowledge (GIAC, CISSP, CCSE, CISA, HBSS, NSA, CEH, Cisco Security, Security +, or other security certifications).
Knowledge of Linux and Windows Operating Systems.
An understanding of a wide array of server grade applications such as: DBMS, Exchange, DNS, SMTP, IIS, Apache, SharePoint, Active Directory, Identity Management, Patch Management, LDAP, SQL, and others
Experience with various security products/technologies such as: Devo, Chronicle, EDR, XDR, Exabeam, Sentinel, QRadar, Splunk, LogRhythm, Securonix, Elastic, RSA NetWitness, SumoLogic, and infrastructure components such as proxies, firewalls, IDS/IPS, DLP etc.
Familiarity with DevOps
Optiv is the cyber advisory and solutions leader, delivering strategic and technical expertise to nearly 6,000 companies across every major industry. We partner with organizations to advise, deploy and operate cybersecurity programs from strategy and managed security services to risk, integration and technology solutions. With clients at the center of our unmatched ecosystem of people, products, partners and programs, we accelerate business progress like no other company can.
We manage cyber risk so you can secure your full potential.
Get notified when new jobs are added by Optiv