EverWatch is a government solutions company providing advanced defense, intelligence, and deployed support to our country’s most critical missions. We are a full-service government solutions company. Harnessing the most advanced technology and solutions, we strengthen defenses and control environments to preserve continuity and ensure mission success.
EverWatch is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex (including pregnancy), gender identity, sexual orientation, national origin, age (40 or older), disability, genetic information, citizenship or immigration status, and veteran status or any other factor prohibited by applicable law.
EverWatch employees are focused on tackling the most difficult challenges of the US Government. We offer the best salaries and benefits packages in our industry - to identify and retain the top talent in support of our critical mission objectives.
EverWatch is pioneering the roll out of zero-trust infrastructure, called Thunderdome, across DoD federal agencies. This will be an excellent opportunity for you to gain practical, hands-on experience with this hot new cybersecurity framework that is sweeping the industry, making you a valuable asset to any team you want to work with going forward. Having zero trust technologies on your resume will be a game changer for your overall career, giving you so much flexibility in the future, as well as much higher earning potential in a shorter period of time.
Work with clients and peers to build a high performing system using Elastic to aggregate logs from many systems into a single common schema. Use Elastic Common Schema (ECS) formatted fields, create quality visualizations and alerts that analyst can use for threat hunting, maintain infrastructure, and identify problems or anomalous behavior before they become a larger issue and can be actioned on. Work with the vendor to determine best practices for deployment and maintenance of system architecture and deploy within designated security requirements.
Basic Qualifications:
Additional Qualifications:
Software Powered by iCIMS
www.icims.com