Security Operations Center Analyst, Senior/Lead
DC, United States
Precision Solutions
Overview
Security Operations Center Analyst, Senior/Lead
Hybrid | onsite 2 days in Washington, DC
Active Public Trust Required
Summary
Our client is an employee and Service-Disabled, Veteran-owned Small Business focused on providing niche technical services. They are a team of experienced cybersecurity professionals with a track record of success in the Federal, Commercial, and Academic workspaces. Additionally, our client designs, builds, operates, and secures scalable cloud and IT infrastructures to meet their customers’ near-term needs and fulfill their long-term requirements.
Responsibilities
On our SOC team, you’ll oversee efforts to find the advanced threats that are escaping detection, by analyzing logs, forensic data, and threat intelligence. Using your deep understanding of your client’s networks combined with your cyber security experience, you’ll analyze patterns to understand attackers’ goals and stop them from succeeding. Once your team finds the adversary in the SEIM’s blind spot, you’ll advise Federal clients on ways to close the gaps and harden their network.
- Monitors real-time network activity for potentially suspicious activity.
- Investigates network anomalies and system events as part of an incident response team.
- Author and implement custom detection content and/or SIEM rules.
- Author and implement custom detection content for perimeter and endpoint security solutions (IDS/IPS).
- Assess the current capabilities of the SOC and identify deficiencies or areas for improvement based on industry and government best practices (such as the MITRE ATT&CK framework) that may address recommendations in strategy, hardware, software, resource support, etc.
- Remain up-to-date with current threats utilizing open source intelligence.
- Provide monitoring and analysis of all SOC data feeds, analytical systems, perimeter and endpoint security devices, as well as SIEM solution during normal business hours to identify and investigate potential security incidents.
Requirements
8+ years of experience with network security, intrusion detection/prevention systems (IDS/IPS), Security Information and Event Management (SIEM) tools, and endpoint protection
Experience with incident response
Ability to lead investigations and mitigate security incidents
Experience in proactive threat hunting and identifying advanced persistent threats (APTs)
Knowledge of Cyber Threat Intelligence (CTI) practices
Ability to integrate intelligence into security operations
Ability to monitor and analyze security alerts, logs, and network traffic for signs of malicious activity
Ability to obtain and maintain a Public Trust or Suitability/Fitness determination based on client requirements
Bachelor’s degree
Education/Certification Requirements
- Bachelors Degree
Preferred Requirements
- Experience with cybersecurity supporting US government programs
- Ability to brief senior leadership and make recommendations
- Possession of excellent verbal and written communication skills to effectively collaborate with team members and other departments
- Possession of strong analytical and problem-solving skills to address complex security challenges
Clearance Requirements
- Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; an active Public Trust is required.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Agile Clearance Cloud Endpoint security IDS Incident response Intrusion detection IPS MITRE ATT&CK Monitoring Network security Open Source SIEM SOC Strategy Threat intelligence
Perks/benefits: Team events
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.