SIEM/Incident SME

Wiltshire  ‐ Onsite
This project has been archived and is not accepting more applications.
Browse open projects on our job board.


Infrastructure Management Security Information and Event Management Architecture Automation Customer Relationship Management Case Management Computer Security Directory Service Incident Response Supervisory Control and Data Acquisition (SCADA) Incident Management Network Architecture Logstash Requirements Analysis Risk Analysis Security Managing System Safety Virtualization Root Cause Analysis Metrics National Institute of Standards and Technology (NIST) Coaching and Mentoring Kibana Safety Principles


Role Title: SIEM/Incident SME

Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton

Duration: 6 months

Contract Inside IR35


Role Description:
Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium

  • The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities.

Your role

  • Develop and integrate security event monitoring and incident management services.
  • Respond to security incidents as they occur as part of an incident response team.
  • Implement metrics and dashboards to give visibility of the Enterprise infrastructure.
  • Use of the SOAR platform to assist with playbook automation and case management capabilities to streamline team processes and tools.
  • Produce documentation to ensure the repeatability and standardisation of security operating procedures.
  • Develop additional investigative methods using the SOC s software toolsets to enhance recognition opportunities for specific analysis.
  • Maintain a baseline of system security according to latest threat intelligence and evolving trends.
  • Participate in root cause analysis of incidents in conjunction with engineers across the enterprise.
  • Provide Subject Matter Expertise (SME) on a broad range of information security standards and best practices.
  • Offer strategic and tactical security guidance including valuation requirement of technical controls.
  • Be part of the CRM process
  • Liaise with the SOC engineers to maintain up-to-date dashboards of security alerts, to allow the organisation to better respond to an incident.
  • Document, validate and create operational processes and procedures to help develop the SOC.
  • Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources.
  • Build, install, configure, and test dedicated cyber defence hardware.
  • Support Junior Analysts to manage SOC systems.
  • Previous experience of Enterprise ICS/network architectures and technologies
  • Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning.
  • Experience as a mentor/coach to Junior Analysts

Your profile

  • Previous experience of utilising the MITRE Telecommunication&CK and Cyber Kill Chain frameworks
  • Skilled in maintaining Microsoft directory services.
  • Skilled in using virtualisation software.
  • Knowledge of key security frameworks (eg ISO, NIST 800-53, , , C2M2)
  • Excellent communication skills
  • Experience of writing Defence/Government documentation

Desirable Qualifications:

  • Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent)
  • SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent)
  • Advanced Analyst Course (SANS SEC503 or equivalent)
Start date
6-12 months
eTeam Inc.
Published at
Project ID:
Contract type
To apply to this project you must log in.