hatch I.T. is partnering with Expression to find anSOC Analyst. See details below:
About The Role:
Expression is seeking anSOC Analystto join their team in support of the National Telecommunications and Information Administration (NTIA) ISCOM this role you will provide cyber threat monitoring analysis and incident response support that strengthens program situational awareness and ensures resilience of critical federal networks. You will support Tier 1 and Tier 2 SOC operations contribute to SOC playbook development and help mature cyber defense strategies in a mission-focused environment.
About the Company:
Founded in 1997 and headquartered in Washington DC Expression provides data fusion data analytics software engineering information technology and electromagnetic spectrum management solutions to the U.S. Department of Defense Department of State and national security community. Expressions Perpetual Innovation culture focuses on creating immediate and sustainable value for their clients via agile delivery of tailored solutions built through constant engagement with their clients. Expression was ranked #1 on the Washington Technology 2018s Fast 50 list of fastest growing small business Government contractors and a Top 20 Big Data Solutions Provider by CIO Review.
Responsibilities:
Monitor detect and analyze security threats risks and alerts using SOC tools and initiate escalation as required.
Conduct cyber threat analysis and contribute to reports for program situational awareness.
Provide Tier 1 response to security incidents and support escalation to Tier 2 during high-volume or critical events.
Conduct functional incident response teams during shifts ensuring accountability and effective resolution.
Conduct malware analysis (static and dynamic) and assess Indicators of Compromise (IOCs).
Perform network forensics and deep packet inspection to investigate intrusions.
Implement remediation strategies and support recovery activities after incidents.
Recommend process improvements and create new detection content to strengthen SOC operations.
Conduct proactive monthly threat hunts and provide reports to stakeholders.
Collaborate with cyber teams for incident escalation coordinated responses and SOC policy/procedure development.
Qualifications:
Bachelors degree in Cybersecurity Computer Science Information Systems or related field; OR equivalent certifications (CompTIA Security CISSP GCIH GCIA).
Minimum of 4 years of experience in security operations incident response or cyber threat analysis.
Strong knowledge of SOC operations incident detection and response workflows.
Familiarity with malware analysis network forensics and packet-level inspection.
Excellent analytical problem-solving and communication skills.
Active Secret or Top Secret clearance required (U.S. Citizenship required)
Preferred Experience
Advanced certifications such as CISSP GCFA GCIH GCIA or equivalent.
Prior experience supporting NTIA Department of Commerce or other federal civilian agencies.
Hands-on experience with SIEM platforms IDS/IPS and endpoint monitoring tools.
Familiarity with the NIST Cybersecurity Framework and Risk Management Framework (RMF).
Experience developing and maturing SOC playbooks processes and detection capabilities.
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.