Full-Time

SOAR Security Engineer

Ts/Sci

Posted on 8/1/2024

GuidePoint Security

GuidePoint Security

501-1,000 employees

Cybersecurity expertise and risk management services

No salary listed

Mid

Reston, VA, USA

Work is 100% onsite in Herndon, VA.

US Top Secret Clearance Required

Category
Cybersecurity
IT & Security
Required Skills
Python
Linux/Unix
Requirements
  • Minimum 3 years experience in SOC operations supporting incident response and/or detection engineering
  • Minimum 1 years experience in building automations in a SOAR platform
  • Experience working with structured data (JSON) and REST/SOAP API's
  • 1+ years of scripting, Python strongly desired
  • DOD 8140.01 – DOD8570.01 M IAT Level II, CSSP Infrastructure
  • Ability to demonstrate analytical expertise, close attention to detail, excellent critical thinking, logic, and solution orientation and to learn and adapt quickly
  • Knowledge of how common protocols and applications work at the network level, including DNS & HTTPS
  • Experience using the Linux command line interface (CLI)
Responsibilities
  • Help the SOC transform manual processes into automated playbooks inside a SOAR platform
  • Build and/or augment incident response processes with automation capabilities
  • Work with analysts to understand existing incident response processes and propose automation use cases to augment those processes
  • Use automation to streamline and standardize customer use cases
  • Work with management to understand incident response and automation reporting needs, then propose and build relevant reports and dashboards
  • Engage with other aspects of the Technical Operations including ticketing, monitoring, and detection tools
  • Work closely with the Security Analyst to automate the collection of supporting information for alert analysis and resulting defensive response
  • Respond to high-priority requests for information/custom detections from key partners
  • Manage and update incident response procedures and workflows/playbooks
  • Become a subject matter expert in the customers' high value assets and targets
  • Build novel monitoring and alerting playbooks to address potential targeted attacks
  • Perform other security operations necessary for continuous monitoring and triaging the platform
Desired Qualifications
  • Experience managing or developing detection logic for enterprise SIEM systems
  • Experience with exploitation techniques and use case development
  • Experience with IOC datasets (e.g., YARA, OpenIOC, STIX)
  • Experience deploying to, and leveraging cloud environments (AWS, Azure, GCP) to extend operational capabilities
  • Strong knowledge of network monitoring and network exploitation techniques, including the MITRE ATT&CK technique framework and other common attack vectors

GuidePoint Security offers cybersecurity expertise and services to help organizations assess and improve their security measures. Their team works closely with clients to evaluate their current cybersecurity status, identify potential risks, and recommend tailored solutions to enhance protection. What sets GuidePoint apart from competitors is their extensive experience, having assisted 40% of Fortune 500 companies and over half of U.S. government cabinet-level agencies. The company's goal is to empower organizations to make informed decisions regarding their cybersecurity strategies, ultimately minimizing risks and optimizing resources.

Company Size

501-1,000

Company Stage

Growth Equity (Non-Venture Capital)

Total Funding

N/A

Headquarters

Reston, Virginia

Founded

2011

Simplify Jobs

Simplify's Take

What believers are saying

  • Increased demand for AI-driven cybersecurity solutions boosts GuidePoint's market potential.
  • Rising adoption of cloud-native security solutions aligns with GuidePoint's CNAPP service.
  • Growing interest in zero-trust models supports GuidePoint's identity and access management services.

What critics are saying

  • Rapid AI evolution requires constant updates to GuidePoint's AI governance solutions.
  • Sophisticated industrialized fraud demands enhanced threat detection and response capabilities.
  • Bitwarden partnership introduces potential password management vulnerabilities if not properly managed.

What makes GuidePoint Security unique

  • GuidePoint Security offers a new CNAPP Enablement Service for cloud-native security.
  • The company provides AI governance solutions for secure and compliant AI adoption.
  • GuidePoint Security partners with Bitwarden to enhance password and secrets management.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Health Insurance

Dental Insurance

Paid Holidays

Unlimited Paid Time Off

Remote Work Options

Phone/Internet Stipend

401(k) Retirement Plan

Pet Insurance

Company News

Addusa
Jun 17th, 2025
GitGuardian Partners with GuidePoint Security to Strengthen Application Security Offerings

GitGuardian partners with GuidePoint Security to strengthen application security offerings.

Cyber Technology Insights
May 21st, 2025
Bitwarden Now Offered Through GuidePoint Security

Bitwarden, the trusted leader in password, passkey, and secrets management, announced a strategic reseller partnership with GuidePoint Security, a leading cybersecurity solutions provider.

Cyber Technology Insights
May 7th, 2025
GuidePoint Security Simplifies Cloud Security with New CNAPP Enablement Service

GuidePoint Security, a cybersecurity solutions leader enabling organizations to make smarter decisions and minimize risk, announced its new Cloud-Native Application Protection Platform (CNAPP) Enablement Service.

MSSP Alert
May 6th, 2025
GuidePoint Security Launches CNAPP Enablement Service to Streamline Cloud-Native Security

GuidePoint Security launches CNAPP Enablement Service to streamline cloud-native security.

CIO First
Apr 28th, 2025
Veza Expands Reach with GuidePoint Security Partnership to Strengthen Identity Security

With Veza's capabilities now integrated into GuidePoint's portfolio, customers can expect enhanced security outcomes, actionable insights, and a more proactive approach to managing identity risks.

INACTIVE