To see a detailed list of our works, please see our case studies.

    Contact Us

    Your email address will not be published. Required fields are marked *

    Contact Details

    10005 Oakton Crossing Ct., Oakton, VA 22124 United States

    info@neevsys.com

    707-NEEVSYS (707-633-8797)

    • Department: Engineering
    • Experience: 5+ Years
    • Location: Location: Rockville, MD, US
    • Email: info@neevsys.com

    Job Description

    This role will help support and manage operational security systems, respond to security events, provide incident response, and improve processes and procedures as per the federal cybersecurity standards & guidelines by utilizing available scanning/monitoring tools, most importantly, Splunk.

      Apply Now

      Your email address will not be published. Required fields are marked *

      Upload Resume (.pdf/.docx)*:

      Technical Skills

      Technologies

      Splunk

      Programming Languages

      Java, C#, React or Angular

      Database Management

      MS SQL, Oracle

      Integrations

      WCF and webAPI

      100%

      Software
      Development

      70%

      System
      Integrations

      Key Responsibilities

      • Monitoring security events, correlating information to identify incidents, issues, threats, and vulnerabilities.
      • Conduct initial triage, containment, categorization, and escalation of suspicious events and incidents.
      • Provide incident response activities as necessary.
      • Assist in the resolution of security incidents through technical analysis and data forensics.
      • Develop and maintain security and incident response plans, playbooks, procedures, and other documentation.
      • Create reports on security trends, metrics, events, and incidents
      • Partner with internal teams to develop and tune security monitoring in the SIEM.
      • Reviews, prepares or presents executive-level key reporting around SIEM and detection
      • Create operational security metrics via the most efficient method (i.e. dashboards, reports).
      • Analysis of known and emerging threats to determine risks against NIAID assets