Who we are looking for:
How you’ll make an impact:
- Work with partners to maintain automation and orchestration of security threats, vulnerabilities, and exploits that could impact systems, networks, and assets worked by the Managed Services operations
- Build tools to assist with the automation of common analysts tasks such as threat intelligence lookups, malware analysis, reporting, and sample analysis.
- Build tools to assist with the automation of large datasets and platform automation (SIEM etc.).
- Build tools to support MSS initiatives such as threat hunting, behavioral analytic, and other advanced analysis
- Consult with internal teams to mitigate environment and tools risk and outages
- Perform knowledge transfers, documents, and train Managed Services operations team regarding automation and orchestration
- Provide ongoing recommendations to changes to improve operational performance to peers and Managed Services team
- Track, measure, and report process and procedure metrics
- Design, implement and oversee the execution of quality controls that ensure rigid adherence to processes and procedures
- Maintain and develop SOP’s and KB’s
Qualifications for success:
- 4-6 years of SOAR experience, any platform, preferably ServiceNow
- Experience working with Incident Ticketing Systems (i.e. ServiceNow, Remedy, RemedyForce, Heat, etc.).
- Python development, expert level
- Exposure to IR procedures
- Exposure to security tools/tech to understand the capabilities and potential interactions
- Demonstrated experience with multiple coding languages such as Python, C#, JavaScript, HTML, and CSS
- Demonstrated experience with command line and shell scripting.
- Demonstrated experience building dashboards with analytic platforms such as Elasticsearch (ELK stack) and Splunk.
- Demonstrated experience with REST, AJAX, SOAP, NIO Push, TLS/SSL/X.509, or other similar technologies.
- Extensive experience in data parsing and handling using managed frameworks
- Basic understanding of malware analysis, threat intelligence, sandboxing technologies (cuckoo), Anti-Virus, Anti-exploit tools, native code vulnerabilities, and web application vulnerabilities
- Basic understanding of open-source intelligence (OSINT), doxing, and investigation procedures
- Basic understanding of common attack vectors and penetration techniques
- Ideally, experience with reporting frameworks such as JSReport and Microsoft office automation platforms
- Basic experience with SIEM platforms such as Splunk, ElasticSearch, Devo administration
With Optiv you can expect:
- A company committed to championing Diversity, Equality and Inclusion through Affinity groups including but not limited to, Women’s Network, Optiv Pride, Black Employee Network, and Veterans Support Network.
- Work/life balance. We offer “Recharge” a flexible, time-off program that encourages eligible employees to take the time they need to recharge
- Professional training resources, including tuition reimbursement
- Creative problem-solving and the ability to tackle unique, complex projects
- Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities.
- The ability and technology necessary to productively work remote/from home (where applicable)