Synergent Tech Solutions · 4 hours ago
Zeek Administrator - California ( Remote)
Maximize your interview chances
Insider Connection @Synergent Tech Solutions
Get 3x more responses when you reach out via email instead of LinkedIn.
Responsibilities
Install and configure Zeek on servers or network sensors.
Set up network taps or packet captures to feed network traffic data into Zeek for analysis.
Fine-tune Zeek scripts to customize network traffic analysis based on organizational needs.
Optimize performance by adjusting configurations related to logging, packet processing, and resource allocation.
Use Zeek to monitor network traffic, including HTTP, DNS, FTP, SSH, and other protocols.
Analyze Zeek logs and events for anomalies, suspicious activity, and possible security breaches.
Investigate network behavior and identify potential threats like intrusions, malware, or data exfiltration based on Zeek data.
Use Zeek logs to gather in-depth metadata and behavior patterns for threat analysis, such as communication flows, DNS queries, or encrypted traffic.
Qualification
Find out how your skills align with this job's requirements. If anything seems off, you can easily click on the tags to select or unselect skills to reflect your actual expertise.
Required
Deploying, configuring, and managing the Zeek Network Security Monitor (formerly known as Bro).
Installing and configuring Zeek on servers or network sensors.
Setting up network taps or packet captures to feed network traffic data into Zeek for analysis.
Fine-tuning Zeek scripts to customize network traffic analysis based on organizational needs.
Optimizing performance by adjusting configurations related to logging, packet processing, and resource allocation.
Using Zeek to monitor network traffic, including HTTP, DNS, FTP, SSH, and other protocols.
Analyzing Zeek logs and events for anomalies, suspicious activity, and possible security breaches.
Investigating network behavior and identifying potential threats like intrusions, malware, or data exfiltration based on Zeek data.
Using Zeek logs to gather in-depth metadata and behavior patterns for threat analysis, such as communication flows, DNS queries, or encrypted traffic.
Company
Synergent Tech Solutions
Synergent Technologies always takes a concerted effort to aid the growth of our client’s business.
Funding
Current Stage
Early StageCompany data provided by crunchbase