SOC Analyst I

Washington, D.C.

Agile Defense

At the forefront of innovation, driving advanced capabilities and solutions tailored to the most critical national security and civilian missions. 

View all jobs at Agile Defense

Apply now Apply later

At Agile Defense we know that action defines the outcome and new challenges require new solutions. That’s why we always look to the future and embrace change with an unmovable spirit and the courage to build for what comes next.
Our vision is to bring adaptive innovation to support our nation's most important missions through the seamless integration of advanced technologies, elite minds, and unparalleled agility—leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation’s vital interests.
Requisition #814Job Title: SOC Analyst ILocation: Must be local to DMV - Occasional onsite work to St NW, Washington, DC 20581Shift Schedule: Mon-Fri 2pm-10pm shiftClearance Level: Active DoD - Public TrustRequired Certification(s): ·       An industry technical certification such as GCIH, MS-SC200 or equivalent
SUMMARYAgile Defense is currently seeking a talented and ambitious self-starting, Junior SOC (Security Operations Center) Analyst to join the Enterprise Security Operations Center (ESOC) team. This is a unique opportunity for the right candidate to embed themselves into the next generation of operational environments which is now taking place across the US government. The existing team is a multi-faceted interdisciplinary set of experts with ever-increasing prowess in this unique environment. Our security operations project is aimed at establishing innovative techniques for a comprehensive, cloud-first network enclave defense, identifying the emerging threats, and detecting malicious activity using advanced toolsets.The SOC Analyst will join a team of multi-disciplinary experts to support a government agency's ESOC Incident Response (IR) capabilities. The SOC Analyst will be responsible for working as part of an integrated security team composed of federal employees and contractors from multiple companies The SOC analyst will also support the day-to-day IR activities and will be responsible for the daily review of security events.
JOB DUTIES AND RESPONSIBILITIES·       Investigate security events using various customer and industry tools to identify potential incidents and perform actions to contain incidents in progress.·       Monitor and analyze logs and alerts from a variety of different systems and tools across multiple platforms in order to respond and report suspected or actual security breaches.·       Develop procedures for use, interpretation, and response to the monitoring and alert information collected.·       Monitor security systems and events to detect and investigate threats, identify and analyze traffic trends, assess the impact of security alerts and traffic anomalies on the customer's network in order to make appropriate recommendations.·       Support daily and hourly monitoring of incident reporting email boxes.·       Support IR team activities in response to security incidents. Activities include but to limited to ensuring completion of the incident from detection through closure, participating in IR meetings and sharing analysis with other branch/division stakeholders, providing situational awareness information to appropriate stakeholders, correlating multiple alerts and incidents to determine widespread attacks, and providing incident status reports to team management and other stakeholders/leadership.
QUALIFICATIONSRequired Certifications·       An industry technical certification such as GCIH, MS-SC200 or equivalentEducation, Background, and Years of Experience·       Bachelor's degree in Computer Science, or related field.·       1-3 years of experience in incident response with 1-2 years of experience in network defense environments preferred.
ADDITIONAL SKILLS & QUALIFICATIONSRequired Skills·       1 - 3 years of experience with tools such as Active Directory, Azure Active Directory, AD Connect, SAML, Kerberos, Cisco IOS, MS Server, Azure cloud environments, Incident Handling, Threat hunting experience, fundamental knowledge of IEEE 7 layers.·       Experience with deployment and documentation of enterprise project management and change management processes.·       Ability to identify solutions to potential network issues/embrace network simplification and strengthened security.·       Ability to conduct event triage and analysis and incident investigation.·       Ability to write threat reports and incident reports.·       Familiarity with NIST and DHS US-CERT incident response requirements and guidelines. Ability to work independently and with other teams.·       Excellent writing, interpersonal and communication skills using standard office automation tools (e.g. Microsoft Office.Preferred Skills·      Microsoft Sentinel Experience preferred·     Understanding of command line scripting and implementation (e.g., Python, Powershell).·       Ability to write latest content/searches/scripts (e.g., Create dashboards, Sentinel alerts, Python scripts, Powershell scripts).·       Familiarity with differences in on-prem OPSEC in relation to cloud-based security.·       Strong understanding of networking (TCP Flags, TCP Handshake, IP addressing, Firewalls, Proxy, IDS, IPS).·       Ability to perform Netflow / packet capture (PCAP) analysis.·       Experience with cyber threat hunting
WORKING CONDITIONSEnvironmental Conditions·       Working Conditions- Working Conditions Statement: Contractor site with 0%-10% travel possible. General office environment. Work is generally sedentary in nature but may require standing and walking for up to 10% of the time. The onsite customer working environment is generally favorable. Lighting and temperature are adequate, and there are not hazardous or unpleasant conditions caused by noise, dust, etc. Work at the customer location is generally performed within an office environment, with standard office equipment available.Strength Demands·       Sedentary – 10 lbs. Maximum lifting, occasional lift/carry of small articles.  Some occasional walking or standing may be required.   Jobs are sedentary if walking and standing are required only occasionally, and all other sedentary criteria are met.Physical Requirements·       Stand or Sit; Walk; Repetitive Motion; Use Hands / Fingers to Handle or Feel; See; Push or PullEmployees of Agile Defense are our number one priority, and the importance we place on our culture here is fundamental. Our culture is alive and evolving, but it always stays true to its roots. Here, you are valued as a family member, and we believe that we can accomplish great things together. Agile Defense has been highly successful in the past few years due to our employees and the culture we create together. 
What makes us Agile? We call it the 6Hs, the values that define our culture and guide everything we do. Together, these values infuse vibrancy, integrity, and a tireless work ethic into advancing the most important national security and critical civilian missions. It's how we show up every day. It's who we are.
We also believe in supporting our employees by offering a competitive and comprehensive benefits package. To explore the benefits we offer, please visit our website under the Careers section.
Happy - Be Infectious.Happiness multiplies and creates a positive and connected environment where motivation and satisfaction have an outsized effect on everything we do.
Helpful - Be Supportive.Being helpful is the foundation of teamwork, resulting in a supportive atmosphere where collaboration flourishes, and collective success is celebrated.
Honest - Be Trustworthy.Honesty serves as our compass, ensuring transparent communication and ethical conduct, essential to who we are and the complex domains we support.
Humble - Be Grounded.Success is not achieved alone, humility ensures a culture of mutual respect, encouraging open communication, and a willingness to learn from one another and take on any task.
Hungry - Be Eager.Our hunger for excellence drives an insatiable appetite for innovation and continuous improvement, propelling us forward in the face of new and unprecedented challenges.
Hustle - Be Driven.Hustle is reflected in our relentless work ethic, where we are each committed to going above and beyond to advance the mission and achieve success.
Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  17  7  0

Tags: Active Directory Agile Automation Azure CERT Cloud Computer Science DoD Firewalls GCIH Government agency IDS Incident response iOS IPS Kerberos Monitoring NIST PCAP PowerShell Python SAML Scripting Sentinel SOC

Perks/benefits: Team events

Region: North America
Country: United States

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.