Tanium Hardware and Software Asset Analyst

The Challenge:

Everyone knows security needs to be “baked in” to a system architecture, but you actually know how to bake it in. You can identify and implement ways to harden systems and reduce their attack surface. What if you could use your Cyber engineering skills to design and build secure systems for the industry? We’re looking for an architect who can help create solutions for industry that will stand up to even the most advanced Cyber threats.

As a Cybersecurity engineer on our project, you’ll provide technical and programmatic support to key client programs and functions. Further, you’ll drive the implementation of the client Cyber mission assurance plan, Cyber operations policy, and procedure development, strategic and operational planning, process improvement, and research and development of engineering efforts across the client space. You’ll work with in-house teams to identify the right mix of tools and techniques to translate your customer’s needs and future goals into a plan that will enable secure and effective solutions. We need to come up with the best solution, so you’ll investigate new techniques, break free from the legacy model, and go where the industry is going. As a team, we’ll take a critical approach to network design, providing alternatives and customizing solutions to maintain a balance of security and mission needs. This is a chance to learn from a team of experts as you make a difference in the security of enterprise security. Your contributions will help customers overcome their most difficult challenges by integrating secure practices like advanced analytics, certificate management processes, and security systems integration visualization. You’ll be able to gain experience in the administration and coordination of system architectures while building peace of mind in a critical infrastructure. Join our team as we improve the defensive posture of the organization through Cybersecurity.

Assess network threats, including computer viruses, exploits, and malicious attacks, determine true threats, false positives, and network system misconfigurations, and provide solutions in a timely manner. Serve as a subject matter expert in the analysis of tool outputs and provide recommendations for improving the overall security posture of the client. Conduct heavy analysis of asset data to aggregate multiple data inputs and put assets into context to identify vulnerabilities and potential gaps.

Empower change with us.

You Have:

-Experience with endpoint management systems, including Tanium, SCCM, BigFix, and Symantec Endpoint

-Experience with Splunk, including creating effective dashboards, hunting Cyber threats using event correlation, and acting on machine intelligence to remediate vulnerabilities and risk to the enterprise

-Experience with netflow analytics for compliance and threat hunting

-Experience with suppliers of data, including WonMug, Cisco ISE, or StealthWatch to maximize efficiency and accuracy of data feeds into Splunk

-Experience with troubleshooting application connectivity and performance through log analysis and network captures

-Knowledge of suppliers of potential features in their tools that could be activated to improve security, including TrustSec and Security Group Tagging in ISE

-Ability to map application components to identify security problems and provide solutions

-Ability to analyze data imports into Splunk for accuracy and completeness and compare data from the various network security tools to identify overlaps and search for gaps

-Ability to obtain a security clearance

-HS diploma or GED

Nice If You Have:

-Experience with Flexera/BDNA, Splunk, BMC Atrium, ServiceNow, and enterprise network infrastructures

-Experience with ForeScout CounterACT, Cisco ISE, and MobileIron

-Experience with project planning

-Experience with Microsoft Office suite of applications

-Possession of excellent writing skills

-BA or BS degree

-CISSP, Certified Ethical Hacker (CEH), SFCP, GCIA, ISSEP, ISSMP, GCIH, GCFA, CSLC, CISM, CCNA, or CCNP Certification

Clearance:

Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information.

Build Your Career:

Rewarding work, fun challenges, and a ton of investment in our people—that’s Booz Allen Cyber. When you join Booz Allen, we’ll help you develop the career you want.

Competitions — From programming competitions at our PyNights (Python competition and learning events) to competing in CTFs, we’ve got plenty of chances for you to show off your skills.

Paid Research — Have an innovative idea to explore or hypothesis to test? You can participate in challenges via our crowdsourcing platform, the Garage, and other programs to be awarded dedicated time and/or funding to advance your skills.

Cyber University — CyberU has more than 5000 instructor-led and self-paced Cyber courses, a free online library that you can access from just about anywhere—including your phone—and certification exam prep guides that include practical assessments to prepare you for your exam.

Academic Partnerships — In addition to our tuition reimbursement benefit, we’ve partnered with University of Maryland University College to offer two graduate certificate programs in Cybersecurity—fully funded without a tuition cap.

Maker/Hackerspaces — Race drones, print 3D gadgets, drink coffee from our Wi-Fi coffee maker, and get hands-on training on tools and tech from in-house experts in our dedicated maker and hackerspaces.

We’re an EOE that empowers our people—no matter their race, color, religion, sex, gender identity, sexual orientation, national origin, disability, veteran status, or other protected characteristic—to fearlessly drive change.

JHT

Not ready to apply? Join our talent community and sign up for job alerts.