Full-Time

Cyber Data Analytics

Ts/Sci

Updated on 12/16/2024

GuidePoint Security

GuidePoint Security

501-1,000 employees

Provides cybersecurity guidance and integration services

Consulting
Cybersecurity

Mid

St. Louis, MO, USA

Work is 100% onsite.

US Top Secret Clearance Required

Category
Data Analysis
Data & Analytics
Required Skills
Elasticsearch
Splunk
Linux/Unix
Requirements
  • An active Top Secret/SCI clearance is required prior to consideration for this role.
  • Midlevel to advanced Linux administration experience (RHEL preferred)
  • SIEM experience with one of the following ArcSight, ElasticSearch, Splunk, Event Broker, User Behavioral Analysis (UBA)
  • Creating alerting rules
  • Proficient in manipulating SIEM filters to better find and analyze potential malicious/atypical activity and reduce false positives
  • Tuning and aggregation of queries and filters
  • Skilled in troubleshooting event flow through an Enterprise Audit infrastructure
  • Skilled in troubleshooting event format and parsing for ingest into data storage and into SIEM tools
  • Active TS/SCI Clearance
  • DoD 8570.01-M IAT Level II and CSSP Infrastructure Support certifications
  • Experience with SIEM and Development Projects
  • Experience with SIEM support for projects and technical exchange meetings
Responsibilities
  • Provide all preventative and corrective maintenance to ensure consistent, reliable, and secure service availability.
  • Maintain system availability and reliability with required SLA.
  • Detect and ticket degradations (volume/velocity) of all SIEM data flows within required SLA of the start of the degradation.
  • Perform day-to-day maintenance, and specific scheduled maintenance activities that result from manufacturers recommended service intervals, alerts, bulletins, available patches, and updates according to agency approved change management processes.
  • Execute emergency maintenance actions with sufficient urgency to preclude unacceptable outage durations.
  • Perform all development, engineering, testing, integration, and implementation actions necessary for major vendor revisions.
  • Perform continuous engineering assessments to improve the performance, effectiveness, coverage, and maturity of this service.
  • Configure all assets assigned to this service within the Government Furnished Information - Software Tools list in accordance with all Federal, DoD, IC, and NGA laws, directives, orders, policies, guidance, procedures etc.
  • Perform all development, design, engineering, testing, integration, and implementation actions needed for the total integration and interoperability between all applicable assets in the Government Furnished Information - Software Tools list.
  • Utilize agency approved ticketing systems to document, track, assign, update, and coordinate all engineering, integration, configuration, and maintenance actions.
  • Use various monitoring, analysis, and visualization tools to track effectiveness, status, performance metrics, and other information as needed or required by Government staff and contractors assigned Cybersecurity Operations Services and Cybersecurity Readiness Services.

GuidePoint Security specializes in providing expert guidance for navigating the cyber landscape, offering services that include insights into the evolving threat landscape and aligning product decisions with resource capacity. They also assist with product comparisons and integration to optimize cybersecurity resources, focusing on technologies such as threat intelligence, security assessments, and cybersecurity product integration.

Company Stage

Growth Equity (Non-Venture Capital)

Total Funding

N/A

Headquarters

Reston, Virginia

Founded

2011

Growth & Insights
Headcount

6 month growth

0%

1 year growth

0%

2 year growth

0%
Simplify Jobs

Simplify's Take

What believers are saying

  • Partnership with Onspring positions GuidePoint in the growing no-code SaaS GRC automation market.
  • Rachel Haag's appointment as CMO enhances strategic partnerships and marketing initiatives.
  • GuidePoint's recognition as a Trusted Cloud Provider builds client trust in cloud security.

What critics are saying

  • Emerging cybersecurity firms offering similar services at lower costs threaten GuidePoint's market share.
  • Rapid evolution of cyber threats may outpace GuidePoint's current service offerings.
  • Over-reliance on partnerships could expose GuidePoint to operational or reputational risks.

What makes GuidePoint Security unique

  • GuidePoint Security offers Phishing as a Service, addressing specific cybersecurity threats like phishing.
  • The company is recognized as a Trusted Cloud Provider by the Cloud Security Alliance.
  • GuidePoint's Federal Emerging Cyber Vendor Program expands its presence in the federal market.

Help us improve and share your feedback! Did you find this helpful?