Company Detail

Crest Security Assurance
Member Since,
Login to View contact details
Login

About Company

Job Openings

  • Support of 24x7x365 on-premise Security Operations capability managing... Read More
    Support of 24x7x365 on-premise Security Operations capability managing cybersecurity risks across systems, assets, data, and capabilities. This service is designed to detect and mitigate unauthorized use of Customer materials, ensuring that intellectual property is safeguarded against piracy and theft. Responsibilities: Detect and mitigate unauthorized use of materials.
    Identify vulnerabilities, prevent content exploitation, and reduce potential legal and financial risks.
    Continuously monitor malware detection software tools.
    Monitor network-based security sensors for anomalies and unauthorized activities. Monitoring security controls and initiating event/incident handling processes.
    Provide summary reports on collaborative efforts with DoD and non-DoD organizations, including recommendations to improve malware protection strategies. Provide quarterly Cybersecurity reports on the security posture of Customer information systems. Integrate Zero Trust component logs and events into existing SIEM/SOAR platforms. Develop custom dashboards, alerts, and reports to monitor policy enforcement and detect anomalous behavior.
    Develop and implement SOAR playbooks for automated response to violations or detected threats. Document and address deficiencies noted through detection activities, specifically regarding tool misconfigurations, policy gaps, or architectural weaknesses. Requirements: Active Secret security clearance
    At least 5 years of related experience DoD IAT II required certification/s (one of the following):
    o CCNA-Security
    o CySA+ (CSA+)
    o GICSP
    o GSEC
    o Security+ CE
    o CND
    o SSCP CSSP-A required certification/s (one of the following):
    o CEH
    o GCIA
    o GCIH
    o CEH
    o GCIA
    o GCIH Location: No Telework Available - On-Premises in Smyrna, GA
    ONE WEEKEND PER MONTH REQUIRED Read Less
  • Serve as the technical lead within a 24x7x365 Security Operations Cent... Read More
    Serve as the technical lead within a 24x7x365 Security Operations Center (SOC), supporting the leadership of a team of cybersecurity professionals during the primary shift of 8:00 AM to 5:00 PM on-site. This role is responsible for guiding the technical direction of SOC operations, including hands-on involvement in incident detection, analysis, containment, and remediation. The Technical Lead ensures that security technologies such as SIEM, SOAR, IDS/IPS, EDR, and threat intelligence platforms are effectively configured, maintained, and optimized to support real-time monitoring and response. Additional responsibilities include mentoring junior analysts, conducting technical training, developing playbooks and detection rules, and leading the technical response to complex or high-severity security incidents. The role also supports coordination of daily operations, ensuring team cohesion, readiness, and continuous improvement of SOC capabilities. Responsibilities Provide technical knowledge and analysis of security incident responses. Perform forensic analysis of devices involved in incidents. Investigate potential intrusions and security events to contain and mitigate incidents. Research cyber-attacks, malware, and threat actors to determine potential impact and develop remediation guidance. Analyze network traffic and identifies attack activity. Document incident response activities and lessons learned. Effectively communicate incident response activities. Provide monitoring and response capabilities. Regularly update and optimize queries and alerting rules. Maintain the confidentiality and integrity of the data within SIEM. Provide timely and accurate reports to management. Collaborate with vendors to ensure proper best practices are enforced and recommendations are delivered. Validate suspicious events by performing investigations using SIEM, leverage tools available to the SOC, threat intelligence and OSINT, TTPs and IOCs. Leverage knowledge of Alert Triage, SOC Operations, and Defense in Depth (DiD) to contribute to projects for overall success. Produce high-quality written and verbal communications, recommendations, and findings to management in a timely manner. Attend focus groups, trainings, industry conferences, and skills enhancement opportunities. Provide timely escalation of events to appropriate teams and external parties. Possess and apply a comprehensive knowledge across key tasks and high impact assignments. Evaluate performance results and recommends major changes affecting short-term project growth and success. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. Requirements: Active Secret security clearance Between 7-10 years of related experience DoD IAT II required certification/s (one of the following): CCNA-Security CySA+ (CSA+) GICSP GSEC Security+ CE CND SSCP CSSP-A required certification/s (one of the following): CEH GCIA GCIH CEH GCIA GCIH Experience with the following skills/tools: Mandiant Managed Defense (FireEye/Trellix NX) Knowledge of Alert Triage SOC Operations Defense in Depth (DiD) Splunk Security Orchestration Automation and Response (SOAR) Amazon Web Services (AWS) EnCase Location: No Telework Available - On-Premises in Smyrna, GA Read Less
  • Support of Customer 24x7x365 on-premise Security Operations capability... Read More
    Support of Customer 24x7x365 on-premise Security Operations capability managing cybersecurity risks across systems, assets, data, and capabilities. This service is designed to detect and mitigate unauthorized use of Customer materials, ensuring that intellectual property is safeguarded against piracy and theft. Responsibilities:
    Detect and mitigate unauthorized use of materials.
    Identify vulnerabilities, prevent content exploitation, and reduce potential legal and financial risks.
    Continuously monitor malware detection software tools.
    Monitor network-based security sensors for anomalies and unauthorized activities.
    Monitoring security controls and initiating event/incident handling processes.
    Provide summary reports on collaborative efforts with DoD and non-DoD organizations, including recommendations to improve malware protection strategies.
    Provide quarterly Cybersecurity reports on the security posture of DCMA information systems.
    Integrate Zero Trust component logs and events into existing SIEM/SOAR platforms.
    Develop custom dashboards, alerts, and reports to monitor policy enforcement and detect anomalous behavior.
    Develop and implement SOAR playbooks for automated response to violations or detected threats.
    Document and address deficiencies noted through detection activities, specifically regarding tool misconfigurations, policy gaps, or architectural weaknesses.
    Provide technical knowledge and analysis of security incident responses.
    Perform forensic analysis of devices involved in incidents.
    Investigate potential intrusions and security events to contain and mitigate incidents.
    Research cyber-attacks, malware, and threat actors to determine potential impact and develop remediation guidance.
    Effectively communicate incident response activities.
    Maintain the confidentiality and integrity of the data within SIEM.
    Provide timely and accurate reports to management.
    Collaborate with vendors to ensure proper best practices are enforced and recommendations are delivered.
    Produce high-quality written and verbal communications, recommendations, and findings to management in a timely manner.
    Attend focus groups, trainings, industry conferences, and skills enhancement opportunities.
    Provide timely escalation of events to appropriate teams and external parties.
    Possess and apply a comprehensive knowledge across key tasks and high impact assignments.
    Evaluate performance results and recommends major changes affecting short-term project growth and success. Requirements: Active Secret security clearance
    Between 3-5 years of related experience DoD IAT II required certification/s (one of the following):
    CCNA-Security
    CySA+ (CSA+)
    GICSP
    GSEC
    Security+ CE
    CND
    SSCP CSSP-A required certification/s (one of the following):
    CEH
    GCIA
    GCIH
    CEH
    GCIA
    GCIH Location: No Telework Available - On-Premises in Smyrna, GA Shifts:
    (Swing Shift)- 2pm-11pm
    (Mid Shift)- 10pm-7am
    ONE WEEKEND PER MONTH REQUIRED Read Less
  • SOC Manager with Security Clearance  

    - Smyrna
    Manages a team of cybersecurity professionals within a 24x7x365 Securi... Read More
    Manages a team of cybersecurity professionals within a 24x7x365 Security Operations Center (SOC), with a primary shift schedule of 8:00 AM to 5:00 PM on-site. This role requires comprehensive oversight of day-to-day SOC activities to protect the agency's digital infrastructure from evolving cyber threats. The position is responsible for managing personnel, directing operational workflows, and ensuring timely execution of security tasks in alignment with performance standards, compliance requirements, and budget constraints. The ideal candidate will possess deep experience across all core SOC functions including monitoring, incident response, threat analysis, and escalation management, and will play a critical role in maintaining the agency's cybersecurity posture. Responsibilities Responsible for IT Security Operations and managing technical teams. Track and report team activities and control scheduling and task assignments. Provide support to the resolution of technical and project focused initiatives. Conduct real-time monitoring, detection, analysis and isolation of incidents on the network. Manage the agency's cybersecurity products, networks and end-user devices, as well as the egress and ingress connections to agency systems. Monitor agency information technology systems and data, including websites, servers, databases, applications, networks, data centers, and endpoints. Work closely with the NOC and support the NOC to improve procedures and services to ensure compliance with security policies. Provide monitoring and analysis support services to include actively reviewing and assessing system and network logs, events, information, and data from various systems, components, and tools available in the SOC. Develop and maintain standard operating procedures (SOPs) for monitoring and analysis tasks, and ensure all incoming staff are trained in the execution of SOPs. Possess a comprehensive knowledge across key tasks and high impact assignments. Evaluate performance results and recommend major changes affecting short-term project growth and success. Plan, initiate, and manage information technology (IT) projects. Lead and guide the work of technical staff. Plan project stages and assess business implications for each stage. Monitor progress to ensure deadlines, standards, and cost targets are met. Requirements: Active Secret Clearance Minimum of 7-10 years SOC experience Minimum of 3-5 years in a Management role DoD IAT II required certification/s (one of the following): CCNA-Security CySA+ (CSA+) GICSP GSEC Security+ CE CND SSCP CSSP-A required certification/s (one of the following): CEH GCIA GCIH CEH GCIA GCIH Experience with the following skills/tools: Mandiant Managed Defense (FireEye/Trellix NX) Knowledge of Alert Triage SOC Operations Defense in Depth (DiD) Splunk Security Orchestration Automation and Response (SOAR) Amazon Web Services (AWS) EnCase Location: No Telework Available - On-Premises in Smyrna, GA Read Less

Company Detail

  • Is Email Verified
    No
  • Total Employees
  • Established In
  • Current jobs

Google Map

For Jobseekers
For Employers
Contact Us
Astrid-Lindgren-Weg 12 38229 Salzgitter Germany