SOC Analyst Lead

Washington, D.C.

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions. 

View all jobs at Agile Defense

Apply now Apply later

Requisition #523 Job Title: SOC Analyst LeadLocation: HYBRID 3-4 days onsite - 45 L Street NE Washington, District of Columbia 20554Clearance Level: Active DoD - Public Trust
Required Certification(s): ·       All NSOC personnel shall hold the CompTIA Security+ or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification.·       One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required.
SUMMARYAgile Defense is currently seeking a talented and ambitious self-starting Security Operations Center (SOC) Analyst Lead with advanced skillsets in cyber security with emphasis on applied cloud security to develop operational strategy in the effort to continually move forward the skills and capabilities of our dynamic team of security analysts for a variety of federal customers.The ideal candidate will have hands-on experience as a SOC analyst performing Incident Response and Intrusion Detection on an operational Federal network, ideally having been migrated to a cloud environment, specifically, the Microsoft Sentinel SIEM and related security portals in Azure. Candidates should have excellent written and oral communication skills, be able to work independently and as part of a team, with demonstrated leadership capabilities.  Skills and experience in Operations Management, Security Event Analysis, Incident Response, Cyber Hunt, Forensics, Malware Analysis, and Cyber Threat Intelligence (skills in more than one cyber discipline are preferred) are required for this position.    The ideal candidate will have hands-on experience supporting a 24x7x365 SOC environment as an analyst or engineer, experience as a technical team lead within the SOC, and operations management experience.  A solid understanding of cyber threats and information security in the domains of TTP’s, Threat Actors, Campaigns, and Observables. Additionally, the ideal candidate would be familiar with intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management. Corporate duties such as solution/proposal development, corporate culture development, mentoring employees, supporting recruiting efforts, will also be required.
JOB DUTIES AND RESPONSIBILITIES·       Manage a SOC to provide cyber defense capabilities to a federal entity in a  comprehensive Computer Network Defense support service through security event monitoring, advanced analytics and response, and cyber intelligence activities.·       Conduct quality assurance reviews of all SOC activities through reviewing of metrics and case analysis while reporting to the Program Manager.·       Serve as a technical Cyber SME and onsite Task Lead.·       Maintain a 24x7 schedule and minimum-manning requirements.·       Lead efforts Planning, organization, scheduling and progress reporting of various projects.·       Construct and optimize operational workflows for 24x7 teams across multiple shifts.·       Develop, collect, analyze security operational metrics to optimize SOC performance and minimize organizational risk.·       Research, evaluate, recommend, and design new security technologies and supporting infrastructure.·       Develop technical cyber security solutions in response to customer requests or in support of proposal solution development.·       Provide technical writing support in support of corporate response to RFPs/RFQs from various customers.·       Support new XOR engagements as transitional program or operations lead.·       Support documentation of all business and workflow processes in this area.·       Provides technical consultation in cyber security capability development.·       Maintains current knowledge of relevant cyber security and related technologies as assigned.·       Serves as liaison with various customers (internal and external).·       Acts as a subject-matter expert to multiple tasks and/or programs.
SUPERVISORY DUTIES·       Experience in mentoring and training junior, mid-level, and senior analysts.
QUALIFICATIONSRequired Certifications·       All NSOC personnel shall hold the CompTIA Security+ or CISSP certification at a minimum at all times during performance of this task order. Additionally, one EnCase Certified Examiner (EnCE) certification.·       One GIAC Certified Incident Handler (GCIH) or GIAC Certified Intrusion Analyst (GCIA) certification is required.
Education, Background, and Years of Experience·       Education and Experience: Bachelor’s Degree from an accredited college
ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills·       8+ years experience in the field of cyber security with demonstrated experience in the following areas: implementation of information engineering projects; systems analysis, design and programming; systems planning; business information planning; and business analysis.·       Work independently to design cloud security operations strategy and report progress.·       Experience with Splunk·       MS tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers.·       Experience with deployment and documentation of enterprise project management and change management processes.·       Ability to identify solutions to potential network/data/asset issues/embrace network simplification and apply strengthened security methods.·       Ability to conduct event triage and analysis and incident investigation.·       Write threat reports and incident reports.·       Read and ingest various govt. regulations for application to agency environment.
Preferred Skills·       Proficiency in utilizing various packet capture (PCAP) applications/engines and in the analysis of PCAP data.·       Ability to develop rules, filters, views, signatures, countermeasures and operationally relevant applications and scripts to support analysis and detection efforts.
WORKING CONDITIONSEnvironmental Conditions·       Onsite 3 - 4 days a week in Washington, D.C.
Strength Demands·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.
Physical Requirements·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See; Push or Pull; Climb (stairs, ladders) or Balance (ascend / descend, work atop, traverse).
Apply now Apply later
  • Share this job via
  • 𝕏
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  0  0  0

Tags: Active Directory Analytics Azure C CISSP Cloud CompTIA Cyber defense DoD EnCase EnCE Forensics GCIA GCIH GIAC Incident response Intrusion detection iOS Kerberos Malware Monitoring PCAP SAML Sentinel SIEM SOC Splunk Strategy Threat detection Threat intelligence

Perks/benefits: Career development

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.