SOC Analst
Vacancy expired!
If interested please send an updated resume to Sara Valle at svalle@apexsystems.com Position: SOC Analyst (2 openings!) Location: Vienna, VA Duration: 6+ Month Contract Clearance: Ability to obtain a Public Trust Shift: 6AM-2PM or 10AM-6PMAs a Incident Handler you will be responsible for leading and participating in threat actor based investigations, creating new detection methodologies, and provided expert support to incident response and monitoring functions. The focus of the Incident Handler is to coordinate the team to investigate and respond to security incidents. To execute this mission, the Incident Handler will use data analysis, threat intelligence, and cutting-edge security technologies. You will directly support the Security Operations Center by applying analytic and technical skills to investigate intrusions, identify malicious activity and potential insider threats, and perform incident response.Required Qualifications:
- 5+ years of relevant cyber security experience in IT Security, Incident Response or network security with strong knowledge working in a SOC
- 2+ years of experience executing the incident handling process from start to finish, including detecting advanced adversaries, log analysis using Splunk or similar tools, and malware triage
- Experience with creating automated log correlations in Splunk or a similar tool to identify anomalous and potentially malicious behavior
- Demonstrated knowledge of the Splunk search language, search techniques, alerts, dashboards and report building.
- Strong analytical and investigation skills
- Experience with active threat hunting and adversary tracking
- Working knowledge of security architectures and devices
- Working knowledge of threat intelligence consumption and management
- Working knowledge of root causes of malware infections and proactive mitigation
- Working knowledge of lateral movement, footholds, and data exfiltration techniques
- Experience with Netflow or PCAP analysis
- Track record of creative problem solving, and the desire to create and build new processes
- Experience and knowledge of packet flow, TCP/UDP traffic, firewall technologies, IDS technologies, proxy technologies, and antivirus, spam and spyware solutions
- Experience converting intelligence into actionable mitigation and technical control recommendations
- Experience with the Windows file system and registry functions or NIX operating systems and command line tools
- Knowledge of the underlying logic that security alerts are built upon and apply them when analyzing raw logs and creating new dashboards and alerts
- Knowledge of typical behaviors of both malware and threat actors and how common protocols and applications work at the network level, including DNS, HTTP, and SMB.
- Experience working in fast paced environments, and ability manage workload even during times of stress or escalated activity
- Comfortable with impromptu tasking and loosely defined requirements
- Strong time management and multitasking skills as well as attention to detail
- Strong collaborative skills and proven ability to work in a diverse team of security professionals
- Excellent oral and written communications skills
- Experience with one or more scripting languages (e.g., Python, JavaScript, Perl)
- Perform memory and malware analysis
- Experience with computer exploitation methodologies
- Experience as a government contractor
- Relevant security certifications (CISSP and GCIA or GCIH)
- Bachelor's degree or higher in a technical field such as Computer Science, Information Security, Information Technology, Computer Engineering, Information Systems, etc.
Vacancy expired!