Nato cleared Cyber Security Data Engineer (SIEM) 5459
€580 - €590 per day
Cyber Security Data Engineer
If you are looking for Nato cleared jobs, we have a great contract role. This role is for a Nato cleared Cyber Security Data Engineer (SIEM). The contract term is for 1 years plus and is based in Mons. The day rate is €580 – €590.
Firstly, be a Subject Matter Expert (SME) for SIEM and LogA services within the Cyber Security Data team.
Secondly, provide advice and technical assistance to other stakeholders, maintain technical expertise, awareness, and developments in related new technologies, and provide technical contributions to projects related to the data security systems.
Likewise, you will be responsible for management and further development of the data security systems.
Furthermore, Following ITIL standards, provide support to Operations and Service Delivery management covering all stages of the data security systems lifecycle (e.g. Service Design, Transition, Operations, Change Management and Continual Service Improvement).
Make sure data security systems are installed, configured, and operating correctly and in line with dependencies with others systems or applications required.
Also, that all system components are continuously monitored and take appropriate technical and non-technical actions for solving detected issues.
Ensure that data security systems operate within any KPI’s, as defined in Service Level Agreements with NCSC customers.
Support integration with external tools and any associated activities.
Proactively identify and propose system improvements to ensure an up-to-date and stable environment. Justify business needs, prepare documentation and implementation plan for the Change Management Board. Implement the approved changes following co-ordination with other stakeholders.
Coordinate with service delivery managers, end users and other stakeholders in support of related services; communicate with other NATO entities as well as industry partners where required.
Develop and maintain documentation guidelines, standard operating procedures, system and service design documents and other relevant documentation that support management of the data security systems.
Create technical and/or executive level reports as required; organise and deliver presentations and briefings for various audience up to NATO executive level.
Under the direction of the STMS Section Head, Data Lead Engineer or delegated authority, the incumbent shall deliver the following:
Work in close collaboration with the SIEM – Monitoring and Detection Service Delivery Manager (SDM) and the Data Lead Engineer on assigned tasks and upcoming deliverables.
Report on system status, results of the health checks and details on any issues identified.
In case of any issues, preparation of a resolution plan and any applicable mitigations. The initial plan has to be prepared within 1 working day.
Manage the ticket queue related to the tools under incumbent’s responsibility. The incumbent will respond to all critical within the same day. High tickets require a response the next day the latest. All other tickets shall be updated at least once a week.
A brief summary of current situation with ongoing tickets. It shall include:
Critical as well as system affecting high tickets,
Identified issues, already present or expected in the future.
Timely delivery of the reports and briefs.
The section head, SDM and/or team lead will regularly assess quality of the deliverables.
The reports shall contain key elements such as date and time of system checks, expected outcome, observed situation.
In case of reported issues provide details on 5W: who (is affected), what (happened), when (day/time), where (which systems), why (any supporting details, potential hypothesis). Essential to have a Bachelor’s Degree in Computer Science combines with a minimum of 2 years’ experience in Cyber Security related post as a Security Engineer or similar position, or a Secondary education and completed advanced vocational education (leading to a professional qualification or professional accreditation) with 5 years post-related experience.
Firstly, at least 1 year of extensive practical experience as Splunk engineer in large enterprise environment (administration, deployment, installation, configuration and maintenance).
Demonstrate experience of analysing and interpreting system, security and application logs in order to diagnose faults and spot abnormal behaviours.
Linux system and application administration and troubleshooting.
Demonstrate ability to work autonomously and proactively, to understand the chain of command and to follow internal processes.
Good communication abilities, both written and verbal, with the ability to clearly and successfully articulate complex issues to a variety of audiences and teams.
Practical skills in writing Bash, Python or Ansible scripts to support repetitive tasks automation.
Extensive practical experience (as system administrator) with Splunk Enterprise security, SOAR and UBA.
Experience with GIT.
Most importantly, hands-on experience with Ansible as an automation technology.
Lastly, industry leading certification in the area of Cyber Security such as CISSP, CISM, MCSE/S, CISA, GSNA, SANS GIAC and CFCE.
Search for other great roles on our jobs pageBack to Jobs