Primary Responsibilities
· Author, test, and maintain automation scripts/workflows within SOAR platform
· Design, implement, and maintain efficient and reusable Python code
· Review, debug, and resolve technical issues throughout all stages of SDLC
· Integrate SOAR platform with other security tools and APIs to execute automated workflows
· Coordinate with System Administrators, Engineers, and ISSOs to provision service accounts and/or grant required permissions
· Assist with process development and process improvement for Security Operations to include creation/modification of SOPs, Playbooks, and Work instructions
· Measure effectiveness of process improvement and automation efforts via metrics and KPIs
· Have expert proficiency with Python
· Working knowledge of SOAP/REST APIs, JSON, HTML/CSS, Javascript, XML
· Experience with SOAR platforms such as Swimlane, Phantom, Demisto, etc
· Experience as a SOC Analyst and/or Incident Responder
· Authored SOC SOPs, playbooks, work instructions and/or other process documents
· Familiarity with Splunk Search Processing Language (SPL) and/or Elastic Domain Specific Language (DSL)
· General networking knowledge to include operation of routers, firewalls, DNS, DHCP, subnetting, VPN and Web Proxies
Required Education/Experience
BS degree in Science, Technology, Engineering, Math or related field and 3 years of prior relevant experience
Preferred Qualifications
Should have 2 years of experience serving as a SOC Analyst or Incident Responder
Freqently Asked Questions
Success in this role hinges on expert Python skills alongside familiarity with security orchestration platforms such as Swimlane, Phantom, or Demisto. Understanding REST/SOAP APIs, JSON, and scripting languages like JavaScript enhances your workflow automation capabilities in Springfield’s cybersecurity landscape.
Unlike general software roles, this position focuses heavily on scripting automation within SOAR platforms, integrating security tools, and collaborating with SOC teams. The routine involves debugging in security contexts and refining playbooks, making it more specialized towards incident response in the Springfield tech market.
Advancement often involves deepening expertise in security automation, mastering SOAR tools, and gaining SOC analyst experience. Springfield’s cybersecurity sector rewards certifications like CISSP or SANS, which can open doors to senior automation engineer roles or leadership in security operations centers.
Base-One Inc attracts highly skilled candidates due to its focus on cutting-edge security automation. The competition is robust locally, with many applicants holding SOC analyst experience and strong Python automation skills, reflecting Springfield’s growing demand for advanced cybersecurity professionals.
At Base-One Inc, engineers engage closely with security operations and incident response teams, gaining hands-on experience with SOAR platform integrations and process improvements. The company supports continuous learning, making it a prime spot for professionals aiming to deepen their automation expertise in a collaborative environment.
Candidates with certifications like GIAC, CISSP, or relevant SOC analyst credentials are often favored. While not always mandatory, holding security clearances can significantly enhance your candidacy at Base-One Inc, especially given the sensitive nature of security automation tasks performed in Springfield.
Springfield’s proximity to federal agencies and defense contractors creates a strong demand for automation engineers skilled in cybersecurity. The work culture tends to emphasize precision, compliance, and collaboration, with frequent cross-team coordination to meet security standards and operational efficiency.
Salaries usually range from $90,000 to $125,000 annually, depending on expertise with SOAR platforms and SOC analyst background. Candidates with over three years' experience and specialized skills in incident response automation can command compensation toward the higher end of this spectrum.
By designing reusable Python scripts integrated within SOAR platforms, these engineers streamline alert triaging and incident handling processes. This reduces manual effort, accelerates response times, and enhances security operations effectiveness, aligning with Base-One Inc’s commitment to proactive threat management.
Expect to troubleshoot complex integration issues between SOAR platforms and various security tools. Debugging in multi-stage SDLC environments and coordinating permissions with system administrators require both coding finesse and strong cross-functional communication skills.
Find The Related Jobs
Capitol Communicator
Full Stack Developer
Herndon, VA
Capitol Communicator
Full Stack Developer
Oakton, VA
Capitol Communicator
Full Stack Developer
Great Falls, VA
Capitol Communicator
Full Stack Developer
Dunn Loring, VA
Capitol Communicator
Full Stack Developer
Arlington, VA
Capitol Communicator
Full Stack Developer
Chantilly, VA