Our Mission

ThetaPoint is a group of expert security engineers who have combined their real world experience to establish a premier IT security consulting firm. ThetaPoint’s primary mission is to enable organizations by providing industry leading services around ArcSight Products, SIEM, Log Management, Incident Response, and general IT security concerns. ThetaPoint consultants have a proven track record of success with Fortune 500 companies and government agencies in all industry verticals.

ThetaPoint was founded on four basic tenets: Experience, Innovation, Solutions, and Collaboration. Together these four principals drive who ThetaPoint is and how we do business. Each principal is critical in the success of every project ThetaPoint completes.

Experience - Results Not Promises

ThetaPoint consultants are some of the most experienced and well-respected thought leaders in SIEM and Log Management. Fortune 500 companies and government agencies call on ThetaPoint for results.

Innovation - Creative Ideas

The landscape in IT security changes on a daily basis. Companies who can’t adapt to these challenges appear on the nightly news. ThetaPoint offers creative ideas for todays most pressing problems.

Solutions - Making the Complex, Simple

ThetaPoint heavily invests in security research to stay on the cutting edge. This research allows ThetaPoint to build reusable solutions to solve some of the most complex problems.

Collaboration - Building Solutions Together

Every company has a unique set of challenges they must address to be successful. ThetaPoint works with clients to discover the best solution to their business problems.

ThetaPoint Partners

Anomali

Anomali delivers earlier detection and identification of adversaries in your organizations network by making it possible to correlate tens of millions of threat indicators against your real time network activity logs and up to a year or more of forensic log data. Anomali’s approach enables detection at every point along the kill chain, making it possible to mitigate threats before material damage to your organization has occurred.

Dell SecureWorks

Dell SecureWorks

With Dell SecureWorks Information Security Services, you gain a true security partner to help protect your IT assets, comply with regulations and reduce costs — without having to build your internal security expertise from scratch. Recognized as a leader by top industry analysts, Dell SecureWorks brings a wealth of deep security expertise and global threat intelligence to your organization.

Hewlett Packard Enterprise

Hewlett Packard Enterprise

Hewlett Packard Enterprise is an industry leading technology company that enables customers to go further, faster. With the industry’s most comprehensive portfolio, spanning the cloud to the data center to workplace applications, our technology and services help customers around the world make IT more efficient, more productive and more secure.

LINBIT

LINBIT

LINBIT is the leader in Linux High Availability and Disaster Recovery technologies. They have specialized in delivering HA/DR cluster solutions software since 1999. LINBIT's product, DRBD, is now the defacto replication standard for High-Availability Clusters. In 2009, DRBD was accepted into the Linux Mainline Kernel making it available to virtually all Linux Distributions worldwide. LINBIT provides development, support, and consulting to the entire Linux High Availability Cluster Stack.

Proficio

Proficio

Proficio is a leading Managed Security Service Provider (MSSP). We are changing the way organizations meet their IT security and compliance goals by providing the most advanced cloud-based solutions to monitor and scan critical assets without the need for added headcount or costly software and hardware systems.

Proficio

Securonix

Securonix is working to radically transform all areas of data security with actionable security intelligence. Our purpose-built advanced security analytics technology mines, enriches, analyzes, scores and visualizes customer data into actionable intelligence on the highest risk threats from within and outside their environment. Using signature-less anomaly detection techniques that track users, account and system behavior, Securonix is able to detect the most advanced data security, insider threats and fraud attacks automatically and accurately. Globally customers are using Securonix to address the most basic and complex needs around advanced persistent threat detection and monitoring, high privileged activity monitoring, enterprise and web fraud detection, application risk monitoring and access risk management.

SOS Security

SOS Security

Headquartered in Houston, Texas, SOS Security is the premier provider of information security products and solutions. Since its inception in 2001, SOS Security has grown steadily to establish its position as a market leader. Customers choose SOS Security to intelligently manage risk, maintain compliance, accelerate, and protect their business from evolving threats. SOS Security has extensive relationships with leading security manufacturers in the marketplace today, which it leverages in order to architect a complete security solution for its customers. SOS Security is focused on meeting the client’s business needs by providing the tools, knowledge, and services needed to get the job done. From initial analysis to implementation, verification to staff training, SOS Security enhances network security and performance through customized, business-focused solutions.

UltimateWindowsSecurity.com

Splunk

Splunk offers the leading platform for Operational Intelligence. It enables the curious to look closely at what others ignore—machine data—and find what others never see: insights that can help make your company more productive, profitable, competitive and secure.

UltimateWindowsSecurity.com

UltimateWindowsSecurity.com

Randy Franklin Smith is a highly trusted subject matter expert on the Windows security log and publishes UltimateWindowsSecurity.com (UWS). Randy spent years reverse engineering the events in the security log and isolating the arcane patterns that help you filter out the noise and mine the real gold that the Windows security log has to offer.

Careers at ThetaPoint

ThetaPoint offers a rewarding and challenging career path. We have great opportunities for self-starters who are looking for a challenge and ready to make a difference. Our success is dependent on our ability to recruit and retain top tier talent. At ThetaPoint you will work with some of the best minds in the IT Security industry. If you are an IT Security professional looking for a change of pace and want to work for a company who truly values exceptional talent, look no further.

ThetaPoint provides end-to-end consulting around SIEM and Log Management Technologies, Incident Response, and general IT Security concerns for Fortune 500 Companies and Government Agencies.

ThetaPoint offers competitive compensation and benefit packages:

  • Competitive Salaries
  • Performance Bonuses
  • Profit Sharing
  • Major Medical Insurance
  • Dental Insurance
  • Life Insurance
  • Short and Long Term Disability Insurance
  • Paid Vacations and Holidays

ThetaPoint is an Equal Opportunity Employer. Prospective employees will receive consideration without discrimination because of race, creed, color, sex, age, national origin, or handicap.

Current ThetaPoint Opportunities

We are actively recruiting for the following positions. If you are interested in joining our team, send us a cover letter and your current resume to careers@theta-point.com. Please include the Job Title you are applying for in the subject of your email.

SIEM Architect

The SIEM Architect is a client-facing role, responsible for architecting SIEM solutions to improve the security value, service management, and scalability for our clients.  A working knowledge of SIEM, threat trends and vectors, and IT/IS architectural design are paramount.  This individual will work under the supervision of Master SIEM Architects and Management while partnering with the client to deliver robust SIEM designs and implementations.

This function will work closely with the client to understand the current and target state of the SIEM and insure effective and efficient incident identification, resolution and root-cause analysis is leveraged through productive implementation of the platform.

The most successful candidate will be a strong technologist with a practical mind and creativity.  This candidate must be able to effectively collaborate with the client’s Information Security and IT/IS teams and ThetaPoint Master Architects to deliver optimal results for the client.  In addition, the SIEM Architect must be able to clearly and successfully communicate with a demonstrated understanding of business and technical requirements of the client.

Visit our SIEM Architect Blog Post for full description of the position including Job Responsibilities, Qualifications, Compensation Plan, and Benifits.

SIEM Engineer

The SIEM Engineer is a client-facing role, responsible for administration, management, configuration, testing and integration of SIEM solutions to improve the security value, service management, and scalability for our clients.  A working knowledge of SIEM, threat trends and vectors, and IT/IS architectural design are paramount.  This individual will work under the supervision of a SIEM Architect and Practice Manager while partnering with the client to deliver robust SIEM solutions.

This function will work closely with the client to understand the current and target state of the SIEM and insure effective and efficient incident identification, resolution and root-cause analysis is leveraged through productive implementation of the platform.

The most successful candidate will be a strong technologist with a practical mind and creativity.  This candidate must be able to effectively collaborate with the client’s Information Security and IT/IS teams and ThetaPoint Architects to deliver optimal results for the client.  In addition, the SIEM Engineer must be able to clearly and successfully communicate with a demonstrated understanding of business and technical requirements of the client.

Visit our SIEM Engineer Blog Post for full description of the position including Job Responsibilities, Qualifications, Compensation Plan, and Benifits.