SOC - Security Operations Analyst

USA

Evolver

Evolver, LLC, a trusted IT transformation & cybersecurity provider, develops scalable tech solutions for government agencies and modern enterprises.

View all jobs at Evolver

Apply now Apply later

Evolver Federal is looking for a SOC - Security Operations Analyst, to join our team on a large Security Operations program with our Federal client located in Washington, DC.


Responsibilities

  • Serving as the Initial Escalation Point for all Investigations/Incidents Requiring Remediation and/or Coordination
  • Continuous Monitoring of the Alert Queue
  • Responding to Security Incidents with Strict Adherence to Codified Triage Process and Procedures
  • Performing Basic Event Correlation and Validation Activities
  • Performing Identification of Effected Systems, Networks and Data
  • Engaging with Network Operations to Refine Contextual Understanding of Incidents as Appropriate
  • Escalating Incidents In Accordance with Established Policies and Procedures
  • Monitoring and Enforcing all Response OLAs/SLAs
  • Identifying and Documenting Any Security Risk Associated with Security Operations/Engineering
  • Documenting Recommendations for Automation and Innovation ICW SE SHIFT SME
  • Initial Analysis of Security Events, Network Traffic, and Logs.
  • ReMonitoring Security Sensor Activity and Associated Logs to Identify Anomalies and Intrusions
  • Network Incident First Responder for Reviewing and Verifying System Alerts/Events/Messages/Status/Availability
  • Identifying Issues with Incident Response Plans, Worflows, SOPs, KBAs, etc.
  • Creation of Shift Turnover Documentation and Products
  • Serving as Entry Point to Security Operations; Log all Requests, RFIs, Calls, etc and Work Through to Customer Satisfaction. Add to Turnover as Required.
  • Creating Reports/Briefs/AARs/etc as Required
  • Joining all EOC/NOC Generated Bridge Calls
  • Thinking Critically and Creatively While Analyzing Security Events, Network Traffic, Events and Logs.
  • Incident Response Coordination: Work with Affected Customers to Gather Incident Information, Assess Mission Impact.
  • Countermeasure Implementation: In support of IR Actions, Create Options for to Isolate and Block Threat Actor Presence.
  • Daily FSA SOC Daily Standup Meeting
  • Leading Mid Day Shift Change Bridge Calls
  • Creating and updating Incident, Request, and Work Orders daily
  • Performs Final Quality Assurance Checks and Closes Tickets with High Degree of Scrutiny
  • Responsible for Daily Block list peer review tasks

Basic Requirements

  • 5 years related experience in security operations
  • Bachelor's degree or 10 years of hands on security work experience
  • US Citizen
  • Must be able to obtain an agency-specific Public Trust clearance.
  • 2 years of experience with Splunk SIEM application

Preferred Requirements

  • 7 years related experience in security operations
  • 3 years of experience with Splunk SIEM application
  • Security+ Certification

Evolver Federal is an equal opportunity employer and welcomes all job seekers. It is the policy of Evolver not to discriminate based on race, color, ancestry, religion, gender, age, national origin, gender identity or expression, sexual orientation, genetic factors, pregnancy, physical or mental disability, military/veteran status, or any other factor protected by law.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  1  0

Tags: Application security Automation Clearance Incident response Monitoring NetOps SIEM SLAs SOC Splunk

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.