- UpvoteDownvoteShare Job
- Suggest Revision
Relevant cybersecurity certifications or the ability to obtain certifications such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC GSEC, or CompTIA Cybersecurity Analyst (CySA.
$58 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant technical and industry certifications are a plus, e.g. Comptia, GIAC certifications, CISSP, OSCP, or SIEM vendor-specific certifications. Security monitoring technologies, such as SIEM, IPS/IDS, UEBA, DLP, among others.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant bachelor's degree or industry-recognized qualifications (CISSP, GIAC, SIEM Vendor Qualification, etc. Experience in coordinating and conducting event collection, log management, event management, compliance automation, and identity monitoring activities using SIEM platforms.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with security technologies such as SIEM, IDS/IPS, firewalls, EDR, and threat intelligence platforms. + Relevant certifications such as CISSP, CISM, GIAC, or equivalent. Proficiency with security technologies such as SIEM, IDS/IPS, firewalls, EDR, and threat intelligence platforms.
$204,360 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding and knowledge of core network security tools such as IDS/IPS, Firewalls, Web Content Filters, SIEM, DLP, etc. Computing Environment certification (Examples include but are not limited to: CEH, GIAC certs, Linux environment certs) required.
$120,750 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate will possess a strong background in development, data engineering, and automation, with a keen understanding of endpoint detection and response (EDR), digital forensics, security orchestration, automation and response (SOAR), and security information and event management (SIEM) tools like Splunk or Elk. Responsibilities include, but are not limited to: Develop and maintain scripts and automation tools using Python or similar programming languages.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Specialized industry certifications such as CISSP, GIAC GSEC, GIAC GCIH and GIAC GREM. Analyze large and complex technical data sets to identify abnormal user, network, and system activity warranting further investigation using SIEM, EDR, and SOAR tools.
Full-timeRemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
While candidates are not required to have these certifications, knowledge should be consistent with that of the following certifications: GIAC Certified Incident Handler (GCIH), GIAC Security Essentials (GSEC), and/or CompTIA Security+ Along with a resume, the candidate shall submit at least 2 writing samples that show experience with cybersecurity operations including intrusion detection, intrusion prevention, and/or incident response.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CompTIA Cloud+, GIAC Cloud Security Automation (GCSA), Certified Cloud Security Professional (CCSP), Azure Security Engineer Associate, or AWS Certified Security Specialty Certification. Knowledge of Azure and AWS cloud native services, centralized logging, SIEM/SOAR, web app security, RBAC and ABAC, Data Security, cloud native architectures, or Zero Trust.
$193,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SANs GIAC Certifications including but not limited to GCED, GCLD, GCIH, GCFA, GREM; CISSP. 3+ year(s) of experience performing event and log analysis including one or more of the following: Anti-Virus, Intrusion Detection Systems, Firewalls, Active Directory, Web Proxies, Data loss prevention tools and other security tools found in large enterprise network environments; along with experience working with Security Information and Event Management (SIEM) solutions.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as CISSP, GIAC, or CISA are preferred. Experience with security incident detection and response tools, such as SIEM, IDS/IPS, EDR, etc. Much of our work contributes to innovative research in the fields of sensor science, signal processing, data fusion, artificial intelligence (AI), machine learning (ML), and augmented reality (AR.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC). Experience with cybersecurity tools and platforms, such as SIEM, firewalls, IDS/IPS, and vulnerability assessment tools.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as GIAC Certified Incident Handler (GCIH) or Certified Incident Response Handler (GCFA) are preferred. Experience with using SIEM systems, network security tools, and log analysis tools.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications (or ability to obtain certification) such as Certified Ethical Hacker (CEH), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC GSEC Certified (GIAC), CompTIA Cybersecurity Systems (CySA.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as GIAC Certified Incident Handler (GCIH), Certified Malware Analyst (CMA), Offensive Security Certified Professional (OSCP), or equivalent are highly desirable. Proficiency in cybersecurity tools and technologies such as malware analysis tools (e.g., IDA Pro, Ghidra), penetration testing frameworks (e.g., Metasploit, Burp Suite), and SIEM systems.
Full-timeRemoteExpandApply NowActive JobUpdated 10 days ago
giac siem jobs in Mclean, VA
FEATURED BLOG POSTS
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.