Security Operations Center (SOC) Analyst/IT Specialist (Part-time)

USA, Sioux Falls, 47914 252nd Street, South Dakota

Apply now Apply later

Title:

Security Operations Center (SOC) Analyst/IT Specialist (Part-time)

Belong. Connect. Grow. with KBR! 

Around here, we define the future.

But we at KBR we share one goal: to improve the world responsibly as a company of innovators, thinkers, creators, explorers, volunteers, and dreamers.

KBR has an immediate need for an energetic and dynamic Security Operations Center (SOC) Analyst, known as an Active Response Center (ARC) Analyst at EROS, in support of the United States Geological Survey (USGS) Earth Resources Observation & Science (EROS) Center (http://eros.usgs.gov/) near Sioux Falls, SD (http://www.siouxfalls.org).

This position is an integral part of the EROS Center-wide Information Technology Team (CITT). The role involves working as part of a 24x7 Active Response Center (ARC) team, with responsibility for monitoring the networks for security issues (using SIEM/log analysis toolsets), performing vulnerability scanning, threat intelligence and undertaking security incident response.

The purpose of this role is to ensure that the EROS Center’s information and systems are protected, in accordance with the needs of the business and according to Information Security principles of availability, integrity and confidentiality.

The ARC operates 24x7 and you will be required to work a shift pattern that covers this. This consists of a mixture of evenings and nights, Monday through Friday and rotation of weekend shifts.

Occasional travel may be required. This position will initially be part-time position at 20 hours a week with full benefits. Potential opportunity to move to fulltime. Internships maybe considered as well for this role.

Education: Working towards a degree in an IT related field. Experience may be substituted for Education experience at manager’s discretion.

Experience: Minimum of 1 year of directly-related technical, professional experience required.

Required Skills:

  • Monitor the networks for malicious activity using Security Incident and Event Management (SIEM) toolsets. This will include responding to and investigating alerts, the development of new security monitoring use cases, and ensuring all investigative activity is properly documented in our ticketing systems and followed up with relevant support teams.
  • Triage issues escalated to the information security team, and ensure that appropriate follow-up actions are taken by the ARC.
  • Take responsibility for developing and maintaining ARC documentation and processes.
  • Take responsibility for monitoring open source intelligence sources for potential threats against the EROS Center, and ensure appropriate defensive actions are taken with respect to these.
  • Take responsibility for running vulnerability scans against EROS infrastructure, interpreting these and following up issues with relevant support team.
  • Highly motivated individual with a genuine enthusiasm for information security and technology;
  • Willingness to work shifts (including unsociable hours and holidays where these fall into your shift pattern) as part of a 24x7 team.
  • Sound understanding of information security principles and best practices;
  • Good infrastructure and technology experience including demonstrable understanding of security operations;
  • Good communication skills both written and verbal;
  • Good knowledge of security issues inherent in common corporate environments;
  • Ability to prioritize workloads and to know when to seek guidance.

Other Desired Skills:

  • Experience working with 1st line ticketing/triage
  • Experience using Security Incident and Event Management (SIEM) toolsets;
  • Experience using vulnerability scanning tools;
  • Experience identifying and reporting on open source threat intelligence;
  • Proven technical ability in Windows/Unix/Linux/etc;
  • Proven technical ability in Microsoft Windows/Active Directory;
  • Proven technical ability in networking systems;
  • Experience with Amazon cloud hosting platforms;
  • Experience with VMware virtualization;
  • Experience with malware analysis

SPECIAL REQUIREMENTS

  • Three years of continuous residency in the US for issuance of a Government Security credential
  • The candidate must be able to obtain and maintain a national agency check and background investigation after hire to obtain a badge for government facility access and user account.

Experience and/or Education in lieu of these qualifications will be reviewed for applicability to meet these requirements.

KBR Benefits​

KBR offers a selection of competitive lifestyle benefits which could include 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule.  We support career advancement through professional training and development.​

Click here to learn more:  KBR Benefits

KBR partners with several other companies to fulfill its requirements as a government contractor. The selected subcontracting companies align their benefits as closely as possible to those above.

At KBR, we are passionate about our people, sustainability, and our Zero Harm culture.  These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a more inclusive and diverse company.  That commitment is central to our team of team’s philosophy and fosters an environment of real collaboration across cultures and locations.  Our individual differences and perspectives bring enhanced value to our teams and help us develop solutions for the most challenging problems.  We understand that by embracing those differences and working together, we are more innovative, more resilient, and safer.  We Deliver – Together. ​

Click here to learn more:  Inclusion and Diversity at KBR

INCLUSION AND DIVERSITY AT KBR

At KBR, we are passionate about our people, sustainability, and our Zero Harm culture.

These inform all that we do and are at the heart of our commitment to, and ongoing journey toward being a more inclusive and diverse company. That commitment is central to our team of team’s philosophy and fosters an environment of real collaboration across cultures and locations. Our individual differences and perspectives bring enhanced value to our teams and help us develop solutions for the most challenging problems. We understand that by embracing those differences and working together, we are more innovative, more resilient, and safer.

KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  21  10  0

Tags: Active Directory Cloud Incident response Linux Log analysis Malware Monitoring Open Source SIEM SOC Threat intelligence UNIX VMware Vulnerability scans Windows

Perks/benefits: 401(k) matching Career development Flex hours Flexible spending account Flex vacation Health care Insurance

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.