drjobs SOC Analyst - Tier 1 ONSITE

SOC Analyst - Tier 1 ONSITE

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Washington - USA

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Job Title: SOC Analyst Tier 1 (ONSITE)
Location: Washington DC
Duration:12 Months

Job Description:
The Client is the central technology organization of the Client. It sets the standard for a number of information technology functions including the security policies and procedures for the Districts IT footprint. The Client as the lead in this Endeavor. The Client team is looking for 2 Tier 1 Security Analysts. Each role is responsible for monitoring The Security Operations Center by responding to alerts notification communications and providing incident response activities such as tracking the incident communication with stakeholders remediation and recovery actions and reporting pertaining to security incidents. The analysts follow standard operating procedures for detecting classifying and reporting incidents under the supervision of Tier 2 and Tier 3 staff.

Roles and Responsibilities:
  • Perform realtime monitoring of internal and information technology security equipment and systems to determine operational status and performance making use of various Security Incident and Event Management (SIEM) tools SOAR platforms and other related security management/console applications such as network traffic and data analytics.
  • Analyze both raw and processed security alert and event data to identify potential security incidents threats mitigations and vulnerabilities.
  • Support followon actions such as coordinating with other organization teams to facilitate remediation of the alert/event/incident and close out the investigation.
  • Perform initial alert/event/incident triage used for investigation.
  • Initiate incident notification case tracking/management recovery actions and report status updates.
  • Perform incident response analysis uncovering attack vectors involving a variety of malware data exposure and phishing and social engineering methods.
  • Coordinate process and procedure actions with geographically separated team members.

Detailed Tasks: Incident Response
  • Support and develop reports during and after incidents which include all actions taken to properly mitigate recover and return operations to normal operations.
  • Participate in the remediation of incidents and responses that are generated from live threats against the enterprise.
  • Coordinate and provide technical support to enterprisewide cyber defense technicians to resolve cyber defense incidents.
  • Assist in realtime cyber defense incident handling (e.g. forensic collections intrusion correlation and tracking threat analysis and direct system remediation) tasks to support deployable Incident Response Teams (IRTs).

Desired Background
  • Bachelors degree in either: Computer Science Engineering Information Technology Cyber Security or equivalent experience in Cyber/IT roles (SOC experience preferred but not required) preferred Cyber Security Certifications such as CompTIA Security
  • Excellent written and oral communication skills.
  • Selfmotivated and able to work in an independent manner.

Compliance
  • Understand enforce and adhere to the company policies and procedures.
  • Have read and understand the Information Security Policy and supporting procedures and do not hinder in any way the proper of procedures defined within.
  • Understand and abide by our nondisclosure and confidentiality agreements.
  • Expertise in implementing administrating and operating information security technologies such as firewalls IDS/IPS SIEM Antivirus network traffic analyzers and malware analysis tools.
  • Utilizes advanced experience with scripting and tool automation such as Perl PowerShell Regex.
  • Develops leads and executes information security incident response plans.
  • Develops standard and complex IT solutions & services driven by business requirements and industry standards.
  • May also leverage dynamic and static code assessment tools to measure vulnerability of applications throughout the SDLC.

Minimum Education/Certification Requirements:
  • BS Degree in IT Cybersecurity or Engineering or equivalent experience

Skills:
SkillsRequired / DesiredAmountof ExperienceImplementing administering and operating IS tech such as firewalls IDS/IPS SIEM Antivirus net traffic analyzers and malware analysis1YearsUtilizing advanced experience with scripting and tool automation such as Perl PowerShell Regex1YearsDeveloping leading and executing information security incident response plans1YearsDeveloping standard and complex IT solutions & services driven by business requirements and industry standards1YearsBS Degree in IT Cybersecurity Engineering or equivalent experience

Required Experience:

Junior IC

Employment Type

Contract

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.