SOC Analyst

Not Interested
Bookmark
Report This Job

profile Job Location:

Baltimore, MD - USA

profile Monthly Salary: Not Disclosed
Posted on: 14 hours ago
Vacancies: 1 Vacancy

Job Summary

Tuknik Government Services a Koniag Government Services company is seeking a SOC Analyst to support TGS and our government customer in Baltimore MD. This position requires the candidate to be able to obtain a Public offer competitive compensation and an extraordinary benefits package including health dental and vision insurance 401K with company matching flexible spending accounts paid holidays three weeks paid time off and Government Services a Koniag Government Services company is seeking a SOC Analyst to support TGS and our government customer in Baltimore MD/Durham NC/Denver CO. The ideal candidate will be able to obtain a Public Trust Clearance. This position involves providing 24/7/365 monitoring and analysis of security event alerts across the enterprise network. The SOC Analyst will monitor agency systems and daily log events to identify potential security threats utilizing various sources such as sensor alert logs firewall logs content filtering logs and Security Information and Event Management logs. The role requires reviewing all incoming alerts investigating and ticketing all identified potential security threats using the agencys incident response-ticketing platform. The SOC Analyst will validate traffic and/or network activity as anomalous according to agency standards and procedures and will identify investigate and escalate potential security threats to senior agency resources when necessary. The position also involves measuring and modeling traffic identifying patterns and ports and producing reports both contractual and ad hoc providing information on events trends issues and activity as requested by the federal customer. Additionally the SOC Analyst will provide data for inclusion in the agencys CISA Report and investigate Open Source Threat Intelligence for the agency. The role may also require the creation of new intrusion detection signatures as needed. Work in a Security Operations Center (SOC) environment providing detailed documentation of reported incidents utilizing ServiceNow. The candidate will function as a SOC Analyst performing triage investigations and responding to a wide variety of alerts. All employees are considered mission critical and are expected to report even during inclement weather Functions Responsibilities & Duties may include but are not limited to:Providing 24/7/365 monitoring and analysis of security event alerts across the enterprise agency systems and daily log events to identify potential security include but not limited to sensor alert logs firewall logs content filtering logs and Security Information and Event Management incoming alerts investigating and ticketing all identified potential security threats using agency incident response ticketing all incoming alerts and responds accordingly in a timely traffic and/or network activity (per alerts/logs) as anomalous in accordance with agency standards and investigating and escalating potential security threats to senior agency resources when and modeling traffic while identifying patterns and reports both contractual and ad hoc providing information on events trends issues and activity as requested by the federal data for inclusion in the agencys CISA OSINT tools to identify and mitigate potential cybersecurity threats to the customers the necessity for and implementation of the creation of new intrusion detection Experience Knowledge Skills & Abilities:Candidate must have a minimum of 1-2 years of experience as an analyst in a SOC or similar knowledge of various SOC tools and their usage for detecting intrusion experience creating custom intrusion signatures to detect specific network traffic experience in populating sensors with newly available signatures when responding to events or management of potential threat reporting and tracking by means of at least one large-scale ticketing system (ServiceNow CAPRS or other similar system).Ability to utilize email instant messaging and other monitoring tools to effectively navigate through the incident response oral presentation skills and the ability to articulate English in a clear and concise experience with Windows Operating System and Microsoft 365 :High School Diploma accompanied with related advanced training and certifications in cybersecurity or a related field. BS/BA degree have at least one of the following certifications: CompTIA Network CompTIA Security or CompTIA CySA. Documented proof of certifications is required prior to the start of with Windows Operating System and Microsoft 365 written and oral communication skills with the ability to convey complex information clearly and live within 2 hours travel of the designated Security Operations Center for which they are be able to obtain a Public TrustNice-to-haves:Bachelors degree in computer science or cybersecurity or information advanced certifications such as Certified Ethical Hacker (CEH) or Certified Information System Security Professional (CISSP).Home lab setup and participation in training platforms like TryHackMe or Equal Employment Opportunity PolicyThe company is an equal opportunity employer. The company shall not discriminate against any employee or applicant because of race color religion creed ethnicity sex sexual orientation gender or gender identity (except where gender is a bona fide occupational qualification) national origin or ancestry age disability citizenship military/veteran status marital status genetic information or any other characteristic protected by applicable federal state or local law. We are committed to equal employment opportunity in all decisions related to employment promotion wages benefits and all other privileges terms and conditions of company is dedicated to seeking all qualified applicants. If you require an accommodation to navigate or apply for a position on our website please get in touch with Heaven Wood via e-mail at or by calling to request Government Services (KGS) is an Alaska Native Owned corporation supporting the values and traditions of our native communities through an agile employee and corporate culture that delivers Enterprise Solutions Professional Services and Operational Management to Federal Government Agencies. As a wholly owned subsidiary of Koniag we apply our proven commercial solutions to a deep knowledge of Defense and Civilian missions to provide forward leaning technical professional and operational solutions. KGS enables successful mission outcomes for our customers through solution-oriented business partnerships and a commitment to exceptional service delivery. We ensure long-term success with a continuous improvement approach while balancing the collective interests of our customers employees and native communities. For more information please visit Opportunity Employer/Veterans/Disabled. Shareholder Preference in accordance with Public Law 88-352

Required Experience:

IC

Tuknik Government Services a Koniag Government Services company is seeking a SOC Analyst to support TGS and our government customer in Baltimore MD. This position requires the candidate to be able to obtain a Public offer competitive compensation and an extraordinary benefits package including heal...
View more view more

Key Skills

  • ArcGIS
  • Intelligence Community Experience
  • GIS
  • Python
  • Computer Networking
  • Data Collection
  • Intelligence Experience
  • R
  • Relational Databases
  • Analysis Skills
  • Data Management
  • Application Development

About Company

Company Logo

What We Do Koniag Government Services (KGS) is an Alaska Native Corporation comprised of multiple wholly owned subsidiary companies that deliver Enterprise Solutions, Professional Services, and Operations Management to Federal Government agencies. With an agile employee and corporate ... View more

View Profile View Profile