12

Security Incident and Event Manager (SIEM) / Log Aggregation (LogA) Tool Manager 3 (NATO NCIA)

Mons, Belgium, Sapienza Consulting [AAS4850]

Field(s) of expertise
Cyber Security
Job type
Contract
Education
Bachelor
Deadline
Closed

About this job

Sapienza Consulting is recruiting a Security Incident and Event Manager (SIEM) / Log Aggregation (LogA) Tool Manager 3 to work at NATO NCIA in Mons, Belgium.

Responsibilities

As Security Incident and Event Manager (SIEM) / Log Aggregation (LogA) Tool Manager, incumbent will be responsible for supporting Cyber Defence operations, maintaining and updating tool’s configurations to match threat environment, specifically for SIEM / LogA perimeter. They will report to Head, Security Tools Management Section and will collaborate with personnel from CS Operations Branch as the content developers and users of tools. They will also work with staff of Platform and Infrastructure Section for platform maintenance and support. SIEM / LogA Tool manager will work with Security Event Analysts (SEAs) and Operations and Maintenance (O&M) Service Staff to help tune security tools for optimum performance, with three main aims:

  1. To ensure logs are properly collected at site level via Arcsight connectors or Splunk forwarders
  2. To ensure that LogA (Log Aggregators) are deployed at remote sites and key systems are configured
  3. To ensure Security Information and Event Management (SIEM) subsystem is operative and collects continuous event rate of events per second from many different sources such as sensors (NIDPS, FPC, HIDS, antivirus, etc.) and network security devices (firewalls, proxies, etc.), analysing and identifying real-time threats

Main responsibilities:

  • Install, Configure and admin Cyber Defence associated specialist tools (see below):
  • Security Incident Event Management (SIEM) – Microfocus ArcSight ESM; Splunk Enterprise Security- Log Aggregation (LogA) Microfocus Arcsight Loggers, Microfocus Arcsight Connectors, Splunk Forwarders
  • Setup monitoring mechanism in order to immediately detect potential issues. Issues shall not be limited to software configuration but to everything related to proper delivery of service (loss of log sources, performance issue, HW resources, data parsing, …)
  • Continuously monitor all system components (SIEM, LogA, log sources) and take appropriate actions for solving detected issues
  • Providing required support and assistance for integrating the tools with other internal tools
  • To ensure that all NCIRC specialist applications related to SIEM and LogA are installed, configured, and running properly and in line with dependencies with others systems or applications and CSSL needs
  • Identify upgrade requirements and areas of improvement to ensure an up-to-date and stable environment
  • Justify business needs, prepare documentation and propose implementation plan for Change Management Board
  • Implement approved changes following co-ordination with other stakeholders
  • Proactively recommend optimizations to capabilities to provide effective and efficient service operations
  • Review security documentation and provide technical advice, when requested
  • Maintain awareness of new technologies and developments, industry standards and best practices within NCSC community for SIEM/LogA tools, participating in knowledge sharing with other analysts and develop solutions efficiently
  • Create technical reports and/or executive level reports as required
  • Provide subject matter expertise and input for any future projects and system expansion
  • Perform other essential duties as assigned

Profile

  • Required Security Clearance: NATO Secret
  • Essential to have Bachelor’s Degree in Computer Science combined with a minimum of 2 years’ experience in as Security Tool Analyst (STA), Tool Manager or similar position involving technical ICT Engineering knowledge, or a Secondary education and completed advanced vocational education (loading to a professional qualification or professional accreditation) with a minimum of 4 years post related experience
  • Extensive practical experience with SIEM and Log Aggregation products – e.g.MicroFocus ArcSight and Splunk
  • Expert level and previous experience related to Log Aggregation and SIEM management activities
  • Demonstrable experience of analysing and interpreting system, security and application logs in order to diagnose faults and spot abnormal behaviours
  • Good knowledge of maintaining a secure enterprise network through configuring and managing typical Security Enforcing Devices, such as Firewalls, Proxies, IDS/IPS devices, HIDS/EPO. Knowledge of Sourcefire/Snort
  • Practical hands-on experience in systems and tools administration
  • Comprehensive knowledge of the principles of computer and communication security, networking, and the vulnerabilities of modern operating systems and applications
  • Troubleshooting of Linux and/or Windows infrastructures
  • Excellent communication abilities, both written and verbal, with the ability to clearly and successfully articulate complex issues to a variety of audiences and teams
  • Demonstrable ability to work autonomously and proactively, to understand the NCSC chain of command and to follow internal processes
  • Practical skills in writing bash, python or ansible scripts to support repetitive tasks automation, Linux system and application administration and troubleshooting
  • Solid understanding of regular expressions
  • Proficient with SIEM content creation – correlation rules, reports, dashboards

 

Desirable:

  • Experience of using and administering security tools such as Sourcefire, Symantec Endpoint Protection, or RSA Security Analytics
  • Experience in creation/modification of custom parsers or flex connectors
  • Understanding the Indicator of Compromise (IOC) concept and experience in integration of Threat Intel feeds and IOCs with SIEM platform
  • Software engineering including programming and/or scripting knowledge (python, shell scripting, PowerShell).
  • Prior experience automating interactions between systems using APIs.
  • Industry leading certification in the area of Cybersecurity such as, but not limited to: CISSP, CISM, MCSE/S, CISA, SANS GNSA, SANS GIAC.
  • A solid understanding of Information Security Practices; relating to the Confidentiality, Integrity and Availability of information (CIA triad.)
  • Prior experience of working in an international environment comprising both military and civilian elements.
  • Prior experience as a user of SIEM and Log aggregation systems

 

Candidates must be eligible to work in the EU

For information on how we process the personal data in your application, please see the Sapienza Privacy Statement here.

For information on how the personal data in your application is processed, please see the Sapienza Consulting Privacy Policy.