31 Oct
Tier 2 SOC Analysts
District of Columbia, Washington 00000 Washington USA

Vacancy expired!

Our DC Metro based client is looking for Tier 2 SOC Analysts. All applicants must be Those authorized to work in the United States without sponsorship are encouraged to apply.S with an active Secret or higher. If you are qualified for this position, please forward a copy of your updated resume in word format to . Thank you.

Location: St Elizabeths Campus, DC

Must Have One of the Following J3 Certifications Tier 2 Monitoring: GCIA Intrusion Analyst GREM Reverse Engineering Malware GPPA Perimeter Protection Analyst GISF Security Fundamentals GXPN Exploit Researcher and Advanced Penetration Tester GWEB Web Application Defender GNFA Network Forensic Analyst GMON Continuous Monitoring Certification OSCP (Certified Professional) OSCE (Certified Expert) OSWP (Wireless Professional) OSEE (Exploitation Expert) SEI (Software Engineering Institute) CCSP Certified Cloud Security Professional CISSP Certified Information Systems Security CCNA Security CCNP Security CEH Certified Ethical Hacker LPT Licensed Penetration Tester ECSA EC-Council Certified Security Analyst ENSA EC-Council Network Security Administrator CNDA Certified Network Defense Architect ECSS EC-Council Certified Security Specialist ECSP EC-Council Certified Secure Programmer ECES EC-Council Certified Encryption Specialist Cyber Analyst Course

Primary Responsibilities Our client, Enterprise Security Operations Center (ESOC) is a US Government program responsible to prevent, identify, contain and eradicate cyber threats to client s networks through monitoring, intrusion detection and protective security services to ESOC. Information systems include local area networks/wide area networks (LAN/WAN), commercial Internet connection, public facing websites, wireless, mobile/cellular, cloud, security devices, servers, and workstations. The ESOC is responsible for the overall security of Enterprise-wide information systems, and collects, investigates and reports any suspected and confirmed security violations. The ESOC Program has a critical need for a talented Tier 2 Monitoring & Analysis (M&A) Analyst to join our team on this highly visible cyber security single-award IDIQ vehicle that provides ESOC support, cyber analysis, application development, and a 24x7x365 support staff. As a Tier 2 Analyst, you would work on a shift schedule, as described below. All shifts total 80 hours every 2 weeks, and multiple shift options are often available.
  • Day: 7 AM to 7 PM
  • Night: 7 PM to 7 AM
  • Front: Sunday through Tuesday, with alternating 8-hour shifts every other Wednesday
  • Back: Thursday through Saturday, with alternating 8-hour shifts every other Wednesday In this job, you will:
  • Conduct malware analysis, host and network, forensics, log analysis, and triage in support of incident response.
  • Recognize attacker and APT activity, tactics, and procedures as indicators of compromise (IOCs) that can be used to improve monitoring, analysis and incident response.
  • Develop and build security content, scripts, tools, or methods to enhance the incident investigation processes.
  • Lead Incident Response activities and mentor junior SOC staff.
  • Work with key stakeholders to implement remediation plans in response to incidents.
  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff, and leadership.
  • Be a flexible and adaptable self-starter with strong relationship-building skills
  • Demonstrate strong problem solving abilities with an analytic and qualitative eye for reasoning
  • Demonstrate ability to independently prioritize and complete multiple tasks with little to no supervision

    Basic Qualification The candidate must be able to attain a DoD Public Trust Clearance The candidate must be able to attain a Govt EOD Clearance. A Tier 2 SOC Analyst should have expertise in one of the following specialized areas:
  • Email Security
  • Monitoring and detection
  • Incident response
  • Cyber intelligence analysis
  • Supporting detection, containment, and eradication of APT activities targeting customer networks.

    Preferred Qualification
  • Ability to script in Python, Bash, Visual Basic, or Powershell
  • Knowledge of Cyber Kill Chain (CKC) or similar frameworks
  • Experience in cyber government, Department of Homeland Security, and/or federal law enforcement

Vacancy expired!


Report job