drjobs Sr SOC Analyst - Washington DC

Sr SOC Analyst - Washington DC

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Washington - USA

Monthly Salary drjobs

$ 125 - 135

Vacancy

1 Vacancy

Job Description

ATTENTION MILITARY AFFILIATED JOB SEEKERS Our organization works with partner companies to source qualified talent for their open roles. The following position is available to Veterans Transitioning Military National Guard and Reserve Members Military Spouses Wounded Warriors and their Caregivers. If you have the required skill set education requirements and experience please click the submit button and follow the next steps. All positions are onsite unless otherwise stated.

Tyto Athene is searching for a Senior SOC Analyst. The Senior Security Operations Center (SOC) Analyst will collaborate with members of the SOC team to detect security events as well as investigate and remediate incidents. The Senior SOC Analyst will develop innovate and implement effective procedures for the SOC to enhance coordination and incident response operations. The Senior SOC Analyst will help train and lead staff on SOC concept of operations and develop incident management teams. Additionally Senior Analyst candidates must be willing to work in a 24x7x365 SOC environment demonstrate intuitive problemsolving skills and allow for flexible scheduling. The position is for Team B Day Shift the hours are 7 AM7 PM Thursday Saturday and every other Sunday.

Responsibilities:

  • Monitor network traffic for security events and perform triage analysis to identify security incidents.
  • Respond to computer security incidents by collecting analyzing and preserving digital evidence and ensure that incidents are recorded and tracked in accordance with SOC requirements.
  • Work closely with the other teams to assess risk and provide recommendations for improving our security posture.
  • Document actions taken and create technical reports detailing investigation efforts and case outcome to SOC Management and the client.
  • Utilize technologies to conduct host forensics Endpoint Detection & Response log analysis and network forensics (full packet capture solution).
  • Provide cybersecurity rootcause analysis and investigative alerts to examine endpoint activity and networkbased data.
  • Conduct malware analysis host and network forensics log analysis and triage in support of incident response.
  • Recognize attacker and APT activity tactics and procedures as indicators of compromise (IOCs) that can be used to improve monitoring analysis and incident response.
  • Develop and build security content scripts tools or methods to enhance the incident investigation processes.
  • Isolate and remove malware.
  • Identify applications and operating systems of a network device based on network traffic.
  • Reconstruct a malicious attack or activitybased offnetwork traffic.
  • Identify network mapping and operating system (OS) fingerprinting activities.
  • Lead Incident Response activities and mentor junior staff.
  • Work with key stakeholders to implement remediation plans in response to incidents.
  • Effectively investigative and identify root cause findings then communicate findings to stakeholders including technical staff and leadership.
  • Author Standard Operating Procedures (SOPs) and training documentation when needed.
  • Generates endofshift reports for documentation and knowledge transfer to subsequent analysts on duty.

Required:
  • Be able to pass Public Trust background investigation.
  • Minimum of one IAT Level 1 security industry specific certifications 8570 Baseline Certifications) i.e. A Network Security CEH CySA GCIH GCIA GCFE GREM GCFA GSEC CISSP CCNA (Security) or equivalent Certifications.


Required:
  • Be able to pass Public Trust background investigation.
  • Minimum of a Bachelors degree or equivalent experience.
  • Minimum 5 years of demonstrated experience in an Intrusion Detection and Response Cybersecurity Incident Responder/Handler type role.
  • Minimum of one IAT Level 1 security industry specific certifications 8570 Baseline Certifications) i.e. A Network Security CEH CySA GCIH GCIA GCFE GREM GCFA GSEC CISSP CCNA (Security) or equivalent Certifications.
  • Full understanding of Tier 1 responsibilities/duties and how the duties feed into Tier 2.
  • The ability to clearly and effectively communicate to a wide audience with varying degrees of technical aptitude such as management other team members and clients.
  • Capability to mentor junior analysts.
  • Conduct research and produce security risk assessments/reports when appropriate.
  • Advanced knowledge of TCP/IP protocols.
  • Knowledge of Windows Linux operating systems.
  • Good understanding of Intrusion Detection Systems (IDS) and SIEM technologies.
  • Knowledge and experience read and interpret deep packet capture (PCAP) and log analysis.
  • Knowledge and experience in Forensic and Malware Analysis
  • Knowledge and experience in Cyber Threat and Intelligence gathering and analysis
Desired:
  • Strong desire to learn and willingness to be challenged.
  • Passion and strong foundation in information security concepts.
  • Knowledge and experience with scripting and programming (Python Powershell etc..
Location:
  • This is a hybrid role with expectations of being on the client site a few days a month.
Shift:
  • This role will be working the hours of 7 AM7 PM EST from Thursday Saturday and every other Sunday.
Compensation:
Compensation is unique to each candidate and relative to the skills and experience they bring to the position. The salary range for this position is typically $125K$135K. This does not guarantee a specific salary as compensation is based upon multiple factors such as education experience certifications and other requirements and may fall outside of the abovestated range.

Benefits:
Highlights of our benefits include Health/Dental/Vision 401(k) match Flexible Time Off STD/LTD/Life Insurance Referral Bonuses professional development reimbursement and maternity/paternity leave

Required Experience:

Senior IC

Employment Type

Full Time

Company Industry

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.